People use smartphones and other mobile computing devices as their primary way of communicating, doing business, and performing different (sometimes critical) tasks. The Trusted Computing Base (TCB) when performing such tasks (e.g. messaging) on a mobile device consists of HW and several layers of SW (much of which proprietary) by several different manufacturers/stakeholders who exercise control over the device. We want to develop technical solutions to give control to the user.
Topics in this theme will contribute towards SW architectures allowing the user to run applications in isolation with minimal trust assumptions. The work has the potential to produce knowledge and tools with great practical impact. The approach to be followed will be empirical (reproduction of existing approaches, comparison, SW/HW co-design). There are several directions to pursue as topics. Depending on the complexity of the topic, partial goals may be set.