next up previous
Next: Communication Security Up: Security Analysis Previous: Access Control

Maligant Code

Malicious code like viruses is prevalent in palm mostly owing to HotSync operations. The malignancy can be acquired from the PC base.It can be prevented by asking the manufacturer to sign it. The required public-key cyptography implementable on these devices is through bf elliptic curve, because RSA is very slow. Using Elliptic curve normal transaction such as key exchange or signature verification can be done in less than 2.4s while signature generation can be done in less than 0.9s [AW01]. The virus trigger in Palm OS can be reduced by secure storage of entry points in a cryptographic coprocessor and secure loading of applications.

The Simputer provides the framework of IML in order to secure the applications. The secure variables do the job. Similarly system critical info can be stored on the smart card for the simputer.

Security processes must be placed at the operating system level such that they are undetectable and inescapable in order to trap malicious code [Mud01]. .


Vaibhav Bhandari 2001-11-29