DEMO: Demonstrating the effectiveness of MOSES for separation of execution modes

Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

In this poster, we describe a demo of a light virtualisation solution for Android phones. We named our solution MOSES (MOde-of-uses SEcurity Separation). MOSES is a policy-based framework for enforcing software isolation of applications and data. In MOSES, it is possible to define distinct security profiles within a single smartphone. Each security profile is associated with a set of policies that control the access to applications and data. One of the main characteristics of MOSES is the dynamic switching from one security profile to another. Each profile is associated with a context as well. Through the smartphones sensors, MOSES is able to detect changes in context and to dynamically switch to the security profile associated with the current context. Our current implementation of MOSES shows minimal overhead compared to standard Android in terms of latencies and battery consumption.

Original languageEnglish
Title of host publicationCCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security
Pages998-1000
Number of pages3
DOIs
Publication statusPublished - 26 Nov 2012
Event2012 ACM Conference on Computer and Communications Security, CCS 2012 - Raleigh, NC, United States
Duration: 16 Oct 201218 Oct 2012

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference2012 ACM Conference on Computer and Communications Security, CCS 2012
CountryUnited States
CityRaleigh, NC
Period16/10/1218/10/12

Keywords

  • Android security extension
  • Light virtualisation
  • Separation of modes

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'DEMO: Demonstrating the effectiveness of MOSES for separation of execution modes'. Together they form a unique fingerprint.

  • Cite this

    Russello, G., Conti, M., Crispo, B., Fernandes, E., & Zhauniarovich, Y. (2012). DEMO: Demonstrating the effectiveness of MOSES for separation of execution modes. In CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security (pp. 998-1000). (Proceedings of the ACM Conference on Computer and Communications Security). https://doi.org/10.1145/2382196.2382304