06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.2 Rationale <strong>for</strong> a <strong>User</strong> <strong>Centric</strong> <strong>Tamper</strong>-<strong>Resistant</strong> Device<br />

possible contenders such as smart card manufacturers (SCMs), MNOs, CIBs, mobile phone<br />

manufacturers (MPMs) and independent/trusted third parties (e.g. post oce). With<br />

reference to trust and brand awareness, SCMs do not have a market presence, as since<br />

the inception of the smart card technology their brand has seldom been part of the nal<br />

product. Whereas, the core competence of MNOs or CIBs is not chip manufacturing,<br />

but a strong branding and an existing customer base. The MPMs can extend their core<br />

competence to secure-element designing/manufacturing, and they also have a strong brand<br />

and customer base. Nevertheless, no one has a clear competitive advantage. There is an<br />

underlying fear that this entire process might be the repeat of the multi-application smart<br />

card initiative, which inspired an initial fervour that later died down due to the conicting<br />

business objectives of dierent organisations. In this entire process, one stakeholder that is<br />

crucial to the survival of all other entities in the ecosystem is missing: the users (consumers)<br />

of the system, which we consider might be a gross oversight. An amicable solution to all<br />

stakeholders could be the UCOM initiative.<br />

2.2.2 Hand-held <strong>Devices</strong><br />

In this thesis, we use the term hand-held devices to refer to mobile phones and tablets.<br />

The reason <strong>for</strong> grouping them together is the similarity in the application lifecycles of these<br />

devices and a growing convergence between their <strong>for</strong>m-factors and underlying plat<strong>for</strong>ms.<br />

The mobile phone plat<strong>for</strong>m has come a long way from being just a medium of communication.<br />

It has developed into a social construct that has aliations and emotional attachments<br />

<strong>for</strong> individual users along with being an entertainment hub, and a medium<br />

to connect with the world through social media sites [48, 49]. With the ever-increasing<br />

trend of convergence of dierent technologies/services in smart phones, they are becoming<br />

attractive targets <strong>for</strong> adversaries who want to compromise the security and privacy of<br />

users.<br />

The so-called App Culture promoted by Apple Inc., which enables users to seamlessly<br />

download any application they desire has opened up the mobile phone application market<br />

to a wide range of companies [40]. New ideas are being tested; <strong>for</strong> example, Starbucks customers<br />

can pay <strong>for</strong> coees using a Starbucks' Card Mobile App on their iPhones. This<br />

indicates that there can be additional services/organisations which develop mobile applications<br />

that per<strong>for</strong>m sensitive processing like banking or healthcare, which have traditionally<br />

required a strong security and privacy architecture. Predominantly, mobile phone plat<strong>for</strong>ms<br />

are not extensively evaluated <strong>for</strong> their security and privacy services, as is normal in<br />

high-end smart cards. In addition, most of the smart phones do not have a tamper-resistant<br />

execution environment [50] (except <strong>for</strong> the secure element). In addition, lack of Mobile<br />

Trusted Module (MTM) adoption leaves application developers with no choice but to de-<br />

35

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!