Publication Type
Journal Article
Version
publishedVersion
Publication Date
1-2018
Abstract
While smart devices based on ARM processor bring us a lot of convenience, they also become an attractive target of cyber-attacks. The threat is exaggerated as commodity OSes usually have a large code base and suffer from various software vulnerabilities. Nowadays, adversaries prefer to steal sensitive data by leaking the content of display output by a security-sensitive application. A promising solution is to exploit the hardware visualization extensions provided by modern ARM processors to construct a secure display path between the applications and the display device. In this work, we present a scheme named SecDisplay for trusted display service, it protects sensitive data displayed from being stolen or tampered surreptitiously by a compromised OS. The TCB of SecDisplay mainly consists of a tiny hypervisor and a super light-weight rendering painter, and has only ∼1400 lines of code. We implemented a prototype of SecDisplay and evaluated its performance overhead. The results show that SecDisplay only incurs an average drop of 3.4%.
Keywords
Mobile device, secure display, virtualization, trusted computing base, display path, trust anchor
Discipline
Information Security | Software Engineering
Publication
Computers, Materials and Continua
Volume
55
Issue
1
First Page
17
ISSN
1546-2218
Identifier
10.3970/cmc.2018.055.017
Edition
35
Publisher
Tech Science Press
Embargo Period
9-10-2018
Citation
CUI, Jinhua; ZHANG, Yuanyuan; CAI, Zhiping; LIU, Anfeng; and LI, Yangyang.
Securing display path for security-sensitive applications on mobile devices. (2018). Computers, Materials and Continua. 55, (1), 17.
Available at: https://ink.library.smu.edu.sg/sis_research/4114
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.3970/cmc.2018.055.017