MOSES: SUPPORTING AND 
ENFORCING SECURITY PROFILES 
ON SMARTPHONES 
PRESENTED BY: 
LANSA INFORMATICS PVT LTD
ABSTRACT 
 Smartphones are very effective tools for increasing the 
productivity of business users. With their increasing 
computational power and storage capacity, smartphones allow 
end users to perform several tasks and be always updated while 
on the move. 
 Companies are willing to support employee-owned 
smartphones because of the increase in productivity of their 
employees. However, security concerns about data sharing, 
leakage and loss have hindered the adoption of smartphones 
for corporate use. 
 In this paper we present MOSES, a policy-based framework for 
enforcing software isolation of applications and data on the 
Android platform.
ABSTRACT 
 In MOSES, it is possible to define distinct Security Profiles within 
a single smartphone. Each security profile is associated with a 
set of policies that control the access to applications and 
data. 
 Profiles are not predefined or hardcoded, they can be 
specified and applied at any time. 
 One of the main characteristics of MOSES is the dynamic 
switching from one security profile to another. 
 We run a thorough set of experiments using our full 
implementation of MOSES. 
 The results of the experiments confirm the feasibility of our 
proposal.
EXISTING SYSTEM: 
 Smartphones allow end users to perform several tasks while being 
on the move. As a consequence, end users require their personal 
smartphones to be connected to their work IT infrastructure. 
 An increasing number of companies are even embracing the 
BYOD: Bring Your Own Device policy, leveraging the employee’s 
smartphone to provide mobile access to company’s applications. 
 Several device manufacturers are even following this trend by 
producing smartphones able to handle two subscriber 
identification modules (SIMs) at the same time. 
 Despite this positive scenario, since users can install third-party 
applications on their smartphones, several security concerns may 
arise. 
 For instance, malicious applications may access emails, SMS and 
MMS stored in the smartphone containing company confidential 
data. 
 Even more worrying is the number of legitimate applications 
harvesting and leaking data that are not strictly necessary for the 
functions the applications advertise to users.
DISADVANTAGES OF EXISTING SYSTEM: 
 It has lot of security issues. 
 Confidential data will be lost. 
 Unwanted applications will run in background 
and cause changes to the data. 
 There is no privacy in data.
PROPOSED SYSTEM: 
 One possible solution to this problem is isolation, by keeping 
applications and data related to work separated from recreational 
applications and private/personal data. 
 Within the same device, separate security environments might exist: 
one security environment could be only restricted to 
sensitive/corporate data and trusted applications; a second 
security environment could be used for entertainment where third-party 
games and popular applications could be installed. 
 As long as applications from the second environment are not able 
to access data of the first environment the risk of leakage of 
sensitive information can be greatly reduced. 
 Such a solution could be implemented by means of virtualization 
technologies where different instances of an OS can run separately 
on the same device.
ADVANTAGES OF PROPOSED SYSTEM: 
 Each security profile (SP) can be associated to one or 
more contexts that determine when the profile become 
active. 
 Both contexts and profiles can be easily and dynamically 
specified by end users. 
 Switching between security profiles can require user 
interaction or be automatic, efficient, and transparent to 
the user.
SYSTEM ARCHITECTURE:
SYSTEM CONFIGURATION:- 
HARDWARE REQUIREMENTS:- 
Processor - Pentium –IV 
Speed - 1.1 Ghz 
RAM - 512 MB(min) 
Hard Disk - 40 GB 
Key Board - Standard Windows 
Keyboard 
Mouse - Two or Three Button Mouse 
Monitor - LCD/LED
SYSTEM CONFIGURATION:- 
SOFTWARE REQUIREMENTS:- 
Operating system : Windows XP. 
Coding Language : Android 
Data Base : SQLite 
Tool : Eclipse.
REFERENCE: 
Yury Zhauniarovich, Giovanni Russello, Mauro Conti, Bruno Crispo and Earlence 
Fernandes “MOSES: Supporting and Enforcing Security Profiles on Smartphones” 
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 11, 
NO. 3, MAY-JUNE 2014.
OFFICE ADDRESS: 
LansA Informatics Pvt ltd 
No 165, 5th Street, 
Crosscut Road, Gandhipuram, 
Coimbatore - 641 015 
OTHER MODE OF CONTACT: 
Landline: 0422 – 4204373 
Mobile : +91 90 953 953 33 
+91 91 591 159 69 
Email ID: lansa.projects@gmail.com 
web: www.lansainformatics.com 
Blog: 
www.lansastudentscdc.blogspot.com 
Facebook: 
www.facebook.com/lansainformatics 
Twitter: www.twitter.com/lansainformatic 
CONTACT US

More Related Content

DOCX
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
PDF
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
PDF
Spe security and privacy enhancement framework for mobile devices
PDF
OS-Project-Report-Team-8
PDF
State ofmobilesecurity
PDF
Managed Security Infographic
PDF
I018145157
PDF
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Spe security and privacy enhancement framework for mobile devices
OS-Project-Report-Team-8
State ofmobilesecurity
Managed Security Infographic
I018145157
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation

What's hot (20)

PDF
Sholove cyren web security - technical datasheet2
PDF
State of Missouri ForeScout Case Study
PDF
Selling Your Organization on Application Security
PDF
Mobile Security: The 5 Questions Modern Organizations Are Asking
PDF
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
PDF
Symantec Mobile Security Whitepaper June 2011
PDF
Samsung knox security_solution_v1_10_0
PDF
Why Hexnode UEM
PDF
Mobile Security 101
PPTX
Android Device Hardening
PDF
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
PDF
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
PDF
Hexnode UEM Remote Device Management
PDF
Безопасность данных мобильных приложений. Мифы и реальность.
PDF
Ieee project-2014-2015-context-based-access-control-systems
PDF
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
PDF
(Pdf) yury chemerkin _ita_2013 proceedings
PDF
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
PDF
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
PDF
Patches Arrren't Just for Pirates
Sholove cyren web security - technical datasheet2
State of Missouri ForeScout Case Study
Selling Your Organization on Application Security
Mobile Security: The 5 Questions Modern Organizations Are Asking
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
Symantec Mobile Security Whitepaper June 2011
Samsung knox security_solution_v1_10_0
Why Hexnode UEM
Mobile Security 101
Android Device Hardening
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
Hexnode UEM Remote Device Management
Безопасность данных мобильных приложений. Мифы и реальность.
Ieee project-2014-2015-context-based-access-control-systems
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
(Pdf) yury chemerkin _ita_2013 proceedings
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Patches Arrren't Just for Pirates

Viewers also liked (11)

DOC
Efficient and privacy aware data aggregation in mobile sensing
DOCX
profilr toward preserving privacy and functionality in geosocial networks
PPT
How long to wait predicting bus arrival time with mobile phone based particip...
PPTX
Delta++ Reducing The Size Of Android Application Updates
DOCX
A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Acc...
DOCX
Hiding in the mobile crowd location privacy through collaboration
DOCX
JPA1404 Context-based Access Control Systems for Mobile Devices
PPTX
Catch Me If You Can- Evaluating Android Anti-Malware Against Transformation A...
PPTX
Secure data retrieval for decentralized disruption tolerant military networks
PPTX
Captcha as graphical passwords a new security primitive based on hard ai prob...
PPT
A cocktail approach for travel package recommendation
Efficient and privacy aware data aggregation in mobile sensing
profilr toward preserving privacy and functionality in geosocial networks
How long to wait predicting bus arrival time with mobile phone based particip...
Delta++ Reducing The Size Of Android Application Updates
A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Acc...
Hiding in the mobile crowd location privacy through collaboration
JPA1404 Context-based Access Control Systems for Mobile Devices
Catch Me If You Can- Evaluating Android Anti-Malware Against Transformation A...
Secure data retrieval for decentralized disruption tolerant military networks
Captcha as graphical passwords a new security primitive based on hard ai prob...
A cocktail approach for travel package recommendation

Similar to Moses Supporting And Enforcing Security Profiles On Smartphones (20)

DOCX
Moses supporting and enforcing security profiles on smartphones
PPTX
Control Issues and Mobile Devices
PDF
Bringing Government and Enterprise Security Controls to the Android Endpoint
PPTX
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
PDF
liferay-safe-slides.pdf
PDF
BYOD: Device Control in the Wild, Wild, West
PPTX
Outside the Office: Mobile Security
PDF
Mobile Security in 2013
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PDF
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
DOCX
Chapter 9Security Vulnerabilities, Threats,and Countermeasur
DOCX
Chapter 9 security vulnerabilities, threats,and countermeasur
PPTX
Isaca tech session 19 feb 2013 securing mobile devices rev
ODP
PDF
Andrew Jaquith SOURCE Boston 2011
PDF
Reference Security Architecture for Mobility- Insurance
PPT
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PDF
Isse 2011 Securing Electronic Business Processes Highlights Of The Informatio...
PDF
Isse 2006 Securing Electronic Busines Processes Highlights Of The Information...
Moses supporting and enforcing security profiles on smartphones
Control Issues and Mobile Devices
Bringing Government and Enterprise Security Controls to the Android Endpoint
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
liferay-safe-slides.pdf
BYOD: Device Control in the Wild, Wild, West
Outside the Office: Mobile Security
Mobile Security in 2013
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
Chapter 9Security Vulnerabilities, Threats,and Countermeasur
Chapter 9 security vulnerabilities, threats,and countermeasur
Isaca tech session 19 feb 2013 securing mobile devices rev
Andrew Jaquith SOURCE Boston 2011
Reference Security Architecture for Mobility- Insurance
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
Isse 2011 Securing Electronic Business Processes Highlights Of The Informatio...
Isse 2006 Securing Electronic Busines Processes Highlights Of The Information...

More from Papitha Velumani (20)

PDF
2015 - 2016 IEEE Project Titles and abstracts in Java
PDF
2015 - 2016 IEEE Project Titles and abstracts in Android
PDF
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
DOC
Trajectory improves data delivery in urban vehicular networks
DOC
Tracon interference aware scheduling for data-intensive applications in virtu...
DOC
Supporting privacy protection in personalized web search
DOC
Stochastic bandwidth estimation in networks with random service
DOC
Sos a distributed mobile q&a system based on social networks
DOC
Security evaluation of pattern classifiers under attack
DOC
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
DOC
Probabilistic consolidation of virtual machines in self organizing cloud data...
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
Privacy preserving and content-protecting location based queries
DOC
Pack prediction based cloud bandwidth and cost reduction system
DOC
Occt a one class clustering tree for implementing one-to-man data linkage
DOC
Leveraging social networks for p2p content based file sharing in disconnected...
DOC
LDBP: localized boundary detection and parametrization for 3 d sensor networks
DOC
Integrity for join queries in the cloud
DOC
Improving fairness, efficiency, and stability in http based adaptive video st...
DOC
Hybrid attribute and re-encryption-based key management for secure and scala...
2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
Trajectory improves data delivery in urban vehicular networks
Tracon interference aware scheduling for data-intensive applications in virtu...
Supporting privacy protection in personalized web search
Stochastic bandwidth estimation in networks with random service
Sos a distributed mobile q&a system based on social networks
Security evaluation of pattern classifiers under attack
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Probabilistic consolidation of virtual machines in self organizing cloud data...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving and content-protecting location based queries
Pack prediction based cloud bandwidth and cost reduction system
Occt a one class clustering tree for implementing one-to-man data linkage
Leveraging social networks for p2p content based file sharing in disconnected...
LDBP: localized boundary detection and parametrization for 3 d sensor networks
Integrity for join queries in the cloud
Improving fairness, efficiency, and stability in http based adaptive video st...
Hybrid attribute and re-encryption-based key management for secure and scala...

Recently uploaded (20)

PDF
Physical pharmaceutics two in b pharmacy
PPTX
GW4 BioMed Candidate Support Webinar 2025
PPTX
PAIN PATHWAY & MANAGEMENT OF ACUTE AND CHRONIC PAIN SPEAKER: Dr. Rajasekhar ...
PDF
Unleashing the Potential of the Cultural and creative industries
PPTX
Approach to a child with acute kidney injury
PDF
GSA-Past-Papers-2010-2024-2.pdf CSS examination
PDF
HSE 2022-2023.pdf الصحه والسلامه هندسه نفط
PDF
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
PPTX
Power Point PR B.Inggris 12 Ed. 2019.pptx
PDF
anganwadi services for the b.sc nursing and GNM
PPTX
CHROMIUM & Glucose Tolerance Factor.pptx
PDF
Laparoscopic Imaging Systems at World Laparoscopy Hospital
PDF
IS1343_2012...........................pdf
PPSX
namma_kalvi_12th_botany_chapter_9_ppt.ppsx
PPTX
Copy of ARAL Program Primer_071725(1).pptx
PPTX
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
PDF
Chevening Scholarship Application and Interview Preparation Guide
PPT
hsl powerpoint resource goyloveh feb 07.ppt
PDF
FYJC - Chemistry textbook - standard 11.
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
Physical pharmaceutics two in b pharmacy
GW4 BioMed Candidate Support Webinar 2025
PAIN PATHWAY & MANAGEMENT OF ACUTE AND CHRONIC PAIN SPEAKER: Dr. Rajasekhar ...
Unleashing the Potential of the Cultural and creative industries
Approach to a child with acute kidney injury
GSA-Past-Papers-2010-2024-2.pdf CSS examination
HSE 2022-2023.pdf الصحه والسلامه هندسه نفط
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
Power Point PR B.Inggris 12 Ed. 2019.pptx
anganwadi services for the b.sc nursing and GNM
CHROMIUM & Glucose Tolerance Factor.pptx
Laparoscopic Imaging Systems at World Laparoscopy Hospital
IS1343_2012...........................pdf
namma_kalvi_12th_botany_chapter_9_ppt.ppsx
Copy of ARAL Program Primer_071725(1).pptx
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
Chevening Scholarship Application and Interview Preparation Guide
hsl powerpoint resource goyloveh feb 07.ppt
FYJC - Chemistry textbook - standard 11.
Horaris_Grups_25-26_Definitiu_15_07_25.pdf

Moses Supporting And Enforcing Security Profiles On Smartphones

  • 1. MOSES: SUPPORTING AND ENFORCING SECURITY PROFILES ON SMARTPHONES PRESENTED BY: LANSA INFORMATICS PVT LTD
  • 2. ABSTRACT  Smartphones are very effective tools for increasing the productivity of business users. With their increasing computational power and storage capacity, smartphones allow end users to perform several tasks and be always updated while on the move.  Companies are willing to support employee-owned smartphones because of the increase in productivity of their employees. However, security concerns about data sharing, leakage and loss have hindered the adoption of smartphones for corporate use.  In this paper we present MOSES, a policy-based framework for enforcing software isolation of applications and data on the Android platform.
  • 3. ABSTRACT  In MOSES, it is possible to define distinct Security Profiles within a single smartphone. Each security profile is associated with a set of policies that control the access to applications and data.  Profiles are not predefined or hardcoded, they can be specified and applied at any time.  One of the main characteristics of MOSES is the dynamic switching from one security profile to another.  We run a thorough set of experiments using our full implementation of MOSES.  The results of the experiments confirm the feasibility of our proposal.
  • 4. EXISTING SYSTEM:  Smartphones allow end users to perform several tasks while being on the move. As a consequence, end users require their personal smartphones to be connected to their work IT infrastructure.  An increasing number of companies are even embracing the BYOD: Bring Your Own Device policy, leveraging the employee’s smartphone to provide mobile access to company’s applications.  Several device manufacturers are even following this trend by producing smartphones able to handle two subscriber identification modules (SIMs) at the same time.  Despite this positive scenario, since users can install third-party applications on their smartphones, several security concerns may arise.  For instance, malicious applications may access emails, SMS and MMS stored in the smartphone containing company confidential data.  Even more worrying is the number of legitimate applications harvesting and leaking data that are not strictly necessary for the functions the applications advertise to users.
  • 5. DISADVANTAGES OF EXISTING SYSTEM:  It has lot of security issues.  Confidential data will be lost.  Unwanted applications will run in background and cause changes to the data.  There is no privacy in data.
  • 6. PROPOSED SYSTEM:  One possible solution to this problem is isolation, by keeping applications and data related to work separated from recreational applications and private/personal data.  Within the same device, separate security environments might exist: one security environment could be only restricted to sensitive/corporate data and trusted applications; a second security environment could be used for entertainment where third-party games and popular applications could be installed.  As long as applications from the second environment are not able to access data of the first environment the risk of leakage of sensitive information can be greatly reduced.  Such a solution could be implemented by means of virtualization technologies where different instances of an OS can run separately on the same device.
  • 7. ADVANTAGES OF PROPOSED SYSTEM:  Each security profile (SP) can be associated to one or more contexts that determine when the profile become active.  Both contexts and profiles can be easily and dynamically specified by end users.  Switching between security profiles can require user interaction or be automatic, efficient, and transparent to the user.
  • 9. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:- Processor - Pentium –IV Speed - 1.1 Ghz RAM - 512 MB(min) Hard Disk - 40 GB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - LCD/LED
  • 10. SYSTEM CONFIGURATION:- SOFTWARE REQUIREMENTS:- Operating system : Windows XP. Coding Language : Android Data Base : SQLite Tool : Eclipse.
  • 11. REFERENCE: Yury Zhauniarovich, Giovanni Russello, Mauro Conti, Bruno Crispo and Earlence Fernandes “MOSES: Supporting and Enforcing Security Profiles on Smartphones” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 11, NO. 3, MAY-JUNE 2014.
  • 12. OFFICE ADDRESS: LansA Informatics Pvt ltd No 165, 5th Street, Crosscut Road, Gandhipuram, Coimbatore - 641 015 OTHER MODE OF CONTACT: Landline: 0422 – 4204373 Mobile : +91 90 953 953 33 +91 91 591 159 69 Email ID: [email protected] web: www.lansainformatics.com Blog: www.lansastudentscdc.blogspot.com Facebook: www.facebook.com/lansainformatics Twitter: www.twitter.com/lansainformatic CONTACT US