Abstract
Mobile phones are personal devices, and as such there is an increasing need for personalised, context-aware applications. This paper describes DCEF (Dynamic Code Execution Framework), a framework which allows applications to securely execute dynamically loaded code, providing new functionality such as client-side personalisation. DCEF ensures the user’s personal information remains safe while executing code from potentially untrusted sources. Our contributions are: the abstract design of DCEF; an evaluation of the security of our design; the implementation of DCEF; a demonstration that runtime performance is acceptable and validation of DCEF by using it to create an application which provides personalised information delivery about cultural heritage and museum sites.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Armac, I., Rose, D.: Privacy-friendly user modelling for smart environments. In: Mobiquitous 2008, pp. 1–6. ICST, Brussels (2008)
Chen, T., Peikari, C.: Malicious Software in Mobile Devices. In: Handbook of Research on Wireless Security, p. 1 (2008)
Cottrill, C., Thakuriah, P.: GPS use by households: early indicators of privacy preferences regarding ubiquitous mobility information access. In: Cahill, V. (ed.) MobiQuitous. ACM, New York (2008)
Gerber, S., Fry, M., Kay, J., Kummerfeld, B., Pink, G., Wasinger, R.: PersonisJ: Mobile, Client-Side User Modelling. In: User Modeling, Adaptation and Personalization (UMAP), pp. 111–122. Springer, Heidelberg (2010)
Goy, A., Ardissono, L., Petrone, G.: Personalization in e-commerce applications. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) Adaptive Web 2007. LNCS, vol. 4321, pp. 485–520. Springer, Heidelberg (2007)
Korpipaa, P., Malm, E., Rantakokko, T., Kyllonen, V., Kela, J., Mantyjarvi, J., Hakkila, J., Kansala, I.: Customizing user interaction in smart phones. IEEE Pervasive Computing, 82–90 (2006)
Kurkovsky, S., Harihar, K.: Using ubiquitous computing in interactive mobile marketing. Personal and Ubiquitous Computing 10(4), 227–240 (2006)
Reynaud-Plantey, D.: New threats of Java viruses. Journal in Computer Virology 1(1-2), 32–43 (2005)
Reynaud-Plantey, D.: The Java Mobile Risk. Journal in Computer Virology 2(2), 101–107 (2006)
Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proceedings of the IEEE 63(9), 1278–1308 (1975)
Töyssy, S., Helenius, M.: About malicious software in smartphones. Journal in Computer Virology 2(2), 109–119 (2006)
Uhlmann, S., Lugmayr, A.: Personalization algorithms for portable personality. In: MindTrek 2008, pp. 117–121. ACM, New York (2008)
Union, I.T.: Measuring the Information Society 2010. International Telecommunication Union (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Pink, G., Gerber, S., Fry, M., Kay, J., Kummerfeld, B., Wasinger, R. (2012). Safe Execution of Dynamically Loaded Code on Mobile Phones. In: Sénac, P., Ott, M., Seneviratne, A. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 73. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29154-8_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-29154-8_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29153-1
Online ISBN: 978-3-642-29154-8
eBook Packages: Computer ScienceComputer Science (R0)