4,248 research outputs found

    vMobiDesk: Desktop Virtualization for Mobile Operating System

    Get PDF
    The widespread use of smart mobile devices brings a lot of benefits to people’s lives and increases the popularity of Bring Your Own Device (BYOD). Along with BYOD, there are also several challenge issues (e.g., limited hardware capacity, frequent upgrades of applications and security and privacy concerns). In this paper, we propose Virtual Mobile Infrastructure (VMI), a general framework that provides more reliable and secure solution for BYOD. VMI is specifically designed for mobile users. The idea of VMI is to host a mobile Operating System (OS) on a remote server in a cloud data center, and run mobile applications on it. It enables mobile users to access the virtual mobile desktops via mobile optimized display protocols through the network. Particularly, we focus on the design and implementation of vMobiDesk, a prototype system for VMI. It provides an implementation of VMI desktop virtualization on Android OS which is one of the most popular mobile operating systems. vMobiDesk focuses on virtualizing the display of Android desktops, redirecting users’ input events, providing audio support and remote camera. The experimental results show that vMobiDesk has a low virtualization overhead, and meanwhile enables mobile users to obtain good user experience on remotely accessing Android virtual desktops

    Finding the future:evolving interaction design

    Get PDF
    The main aim of this project is to design and prototype a simplified example of a mobile operating system that makes use of both edge swipe control and 'smart' graphical instructions. The research will consider how these methods can be used to design a truly inclusive and accessible interface. The effectiveness of these features will be validated through user experiments and focus groups over the course of the project, with the findings of user testing used to inform design practice

    Android Security, Pitfalls, Lessons Learned and BYOD

    Get PDF
    Over the last two years Android became the most popular mobile operating system. But Android is also targeted by an over-proportional share of malware. In this paper we systematize the knowledge about the Android security mechanisms and formulate how the pitfalls can be avoided when building a mobile operating system. As smartphones enter the corporate domain, a new scheme called bring your own device (BYOD) became popular. One solution is to logically partition the device such that personal and business information are isolated from one another. We systematize the solutions for partitioning in Android

    Integrating TrustZone Protection with Communication Paths for Mobile Operating System

    Get PDF
    Nowadays, users perform various essential activities through their smartphones, including mobile payment and financial transaction. Therefore, users’ sensitive data processed by smartphones will be at risk if underlying mobile OSes are compromised. A technology called Trusted Execution Environment (TEE) has been introduced to protect sensitive data in the event of compromised OS and hypervisor. This dissertation points out the limitations of the current design model of mobile TEE, which has a low adoption rate among application developers and has a large size of Trusted Computing Base (TCB). It proposes a new design model for mobile TEE to increase the TEE adoption rate and to decrease the size of TCB. This dissertation applies a new model to protect mobile communication paths in the Android platform. Evaluations are performed to demonstrate the effectiveness of the proposed design model

    Runtime CPU scheduler customization framework for a flexible mobile operating system

    Get PDF
    Mobile operating systems should adapt to different applications requirement such as multimedia, games, video and audio applications, and mobile calls, etc. Process scheduling is considered as the most important part of the mobile operating system, which has the responsibility for adapting the operating systems to these applications requirements. In this work, the architecture for a runtime CPU scheduler customization framework for the Linux kernel that take into account different applications requirements is presented. The Runtime CPU Scheduler Customization (RCSC) framework permits the mobile devices users as well as the developers of Linux-based mobile operating systems to customize CPU scheduler to run with a specific scheduling policy as well as evaluate newly developed scheduling policies from user space at runtime. As a consequence, mobile operating system can be tuned manually or automatically in order to adapt with the requirements of a particular application
    corecore