International Workshop on Mobile Security

Research Article

SAVED: Secure Android Value addED services

Download
603 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-29336-8_30,
        author={Antonio Grillo and Alessandro Lentini and Vittorio Ottaviani and Giuseppe Italiano and Fabrizio Battisti},
        title={SAVED: Secure Android Value addED services},
        proceedings={International Workshop on Mobile Security},
        proceedings_a={MOBILE SECURITY},
        year={2012},
        month={10},
        keywords={IPC security Value Added Services digital certificate service interoperability},
        doi={10.1007/978-3-642-29336-8_30}
    }
    
  • Antonio Grillo
    Alessandro Lentini
    Vittorio Ottaviani
    Giuseppe Italiano
    Fabrizio Battisti
    Year: 2012
    SAVED: Secure Android Value addED services
    MOBILE SECURITY
    Springer
    DOI: 10.1007/978-3-642-29336-8_30
Antonio Grillo1,*, Alessandro Lentini1,*, Vittorio Ottaviani1,*, Giuseppe Italiano1,*, Fabrizio Battisti1
  • 1: University of Rome “Tor Vergata”
*Contact email: grillo@disp.uniroma2.com, lentini@disp.uniroma2.com, ottaviani@disp.uniroma2.com, italiano@disp.uniroma2.com

Abstract

The availability of free Software Development Kits for recent mobile device platforms challenges many developers in realizing applications for the growing Smartphone market. In many cases such applications may interoperate in their working environment using mechanisms similar to the inter-process communication (IPC) and made available by the mobile operating system. Unfortunately, mobile devices lack in flexible solutions for making these communications secure. In this paper we propose a framework to secure the message exchange with the services installed on Google Android mobile devices. VASs realized by different providers are discovered, used and composed by an Application Frame designed for realizing complex goals. We implemented a prototype of our proposed framework on a real device and we performed extensive testing to measure the overhead introduced by the cryptographic operations required to protect the inter process communication.