…… ... Exercise 3 Exercise Fatbardh Veseli, M.Sc. Veseli, Fatbardh Security Multilateral & Business Mobile of Chair Telekom Deutsche JohannWolfgang UniversityFrankfurt GoetheM. a. MobileBusiness I (WS2015/6) Te c h n ol og y B a s i c s I I …… ... 2 Literature Concepts of Mobile Operating Systems Operating Mobile of Concepts and Systems Operating Mobile of Market Overview Smart Smart cards andApplication Related Infrastructures Devices Mobile Lecture 8: Lecture 9: Lecture 10: Lecture 11: Security Aspects § § § § This set of slides is based upon the following lectures: following the upon based is slides of set This § …… ... 3 Exercise1: Smartcards they consist of (=what do they contain)? they do (=what of consist they What are smart cards and what components do do components what and cards smart are What a) 1 …… ... 4 and Smartcards , , keys with memory control access , againstmanipulation and initialised I/O , protected Afterbeing other data smartcards aredistributed to theirusers. operatingsystem processor Chip Small computers with § § § 1a …… ... 5 operating system main memory application application data Smartcards RAM ROM EEPROM Smartcard CPU Access Control RST I/O Vcc Clk GND Vpp supply power ground in/output reset signal reset clock signal [Source: SecCommerce2002] [Source: 1a programming power …… ... 6 Exercise1: Smartcards smartcards play with respect towith play respectsmartcards security (i) applications? (ii) Why are they used and what role do do role what and used they are Why b) 1 …… ... 7 Smartcards of data (e.g. for keys, for (e.g. of data in insecure insecure in security Phone cards of Deutsche Telekom Signature cards according to German Signature Law Smartcard applications for PC Smartcards for mobile communication (SIMs) § § § § Examples: environments signatures, physical access control,accessphysical signatures, needed is payment) Used when § § 1b …… ... 8 Smartcards − Examples 1b …… ... 9 Why Smartcards? Why „Cracking“ of credentials of „Cracking“ fraud Billing Unauthorisedusageof servicesthrough datauser forged Duplicationcredentialsof auser’s § § § § Protection neededagainst: 1b …… ... 10 Duplicationof intercepted user IDs design (CDMA) design Example for faulty system 1b …… ... 11 Exercise 2: Exercise SubscriberIdentityModule (SIM) SubscriberIdentityModule (SIM)in GSM and UMTS networks. Name the most important function of the of the function important mostthe Name a) 2 …… ... 12 cf. [EffingRankl2008] Communication provided by the the by provided i K Smartcards for Mobile key subscriber identificationsubscriber for IMSI) serve as security medium. ( encryption resistance prevents counterfeiting. counterfeiting. prevents resistance - Smartcards: InternationalMobile Subscriber s are SIM cards cards SIM Tamper design robust Identity the and operator mobile the Reliablyexecute computationalfunctions for Contain Contain SIM 2a …… ... 13 Module(SIM) to to “phone” The Subscriber Identity Subscriber The a Identity between subscriber & Module” to reflectprogress (authentication) contract the network by linkingit a to and moreand called“Subscriber Management (identification) Identification of field general the in use subscription upcoming for WLAN for upcoming operator network More Authenticates and authorizes authorizes and Authenticates Represents In GSM andUMTS since 1991, 2a …… ... 14 Exercise 4: Exercise SubscriberIdentityModule (SIM) SubscriberIdentity Module contain? Which of these contents are are contents these of Which contain? why? and not are which protected, What does the the does What b) 2 …… ... 15 SIM Card Content (Extract) Frequency Frequency information keys (session) generated Dynamically Attributes of GSM login memory) SMS list, telephone book, (address data User A3,A8 crypto algorithms for signing and encryption services subscribed of List subscriber the by used Language information Cell IMSI, PIN, PUK PIN, IMSI, § § § § § § § § § Dynamic data: Protected data: § § 2b …… ... 16 Exercise 2: Exercise Subscriber SubscriberIdentityModule (SIM) IdentityModule. Name other functionalities of the the of functionalitiesother Name c) 2 …… ... 17 of SIM: SIM: Functionality “ for GSM GSM for “ − cryptography - configurationdata billingofroaming − card the of issuer identity card identity secure billing of of billing secure by roaming partner. roaming by SIM through SIM containsadditional system. GSM the important for card issuer. card for important SIM allowsfor subscribers SIM identifiesthe the for important subscribers cellular phone subscribers. phone cellular SIM servesas „ § § § § 2c …… ... 18 cf. [EffingRankl2002] Communication Smartcards for Mobile for subscriber identificationsubscriberfor provided by the mobile mobile the by provided i K serve as security medium. IMSI) resistance prevents counterfeiting. counterfeiting. prevents resistance - Smartcards: design ( InternationalMobile Subscriber s are SIM cards cards SIM Tamper Robust § § § and the key key the and operator Reliablyexecute computationaldevice mobile the functions for Contain Contain Identity SIM § § § 2c …… ... 19 SIM SIM Gemalto the about heard you hack? Have card § …… ... 20 heist/ - sim - /2015/02/19/great theintercept.com https:// …… ... 21 Exercise 2: Exercise SubscriberIdentityModule (SIM) pplication examples for SIM SIM for examples pplication Application Toolkit. Application (i) What does it do? it does What (i) a Name (ii) What is SIM Application Toolkit? Application SIM is What d) 2 …… ... 22 Phones on aon actions specifies - SIM SIM commands or execute execute or standard used foraccessing the files SIM: SIM: Integration into Mobile [GSM2006] [GSM2006] additional applications additional serial interface is interface serial SIM. Devicecanaccess commands. SIM through for allows (STK) Toolkit“ Application „SIM implementing electricalaswell assoftware interfaces device. and SIM between A card. through Communication ETSI GSM 11.11 GSM ETSI § § § § § 2d …… ... 23 for interacting Value Added Services for SIM Application SIM− SAT Toolkit programmable SIMs programmable 1996 as ETSI GSM 11.14, extended security functionality security I/O, Telephony, Download I/O, Telephony, an interface [GSM2006] Allows for Allows „Living standard“ with mobile devices mobile with Standardised 1999 Controls Provides implemented on § § § § § 2d …… ... 24 Application − ExamplesSAT Brokerage via cellular phone services and of userstrying to access servers Online Online SMS banking - based based - Mobile and T and Mobile - ATM search, navigation signatures Mobile T § § § Security applications in general general in applications Security Location Authentication Secure payment Secure Mobile § § § § § 2d …… ... 25 Exercise 3: Exercise UniversalSIM/USIM What is a USIM? a is What a) 3 …… ... 26 on on SIMs 3GPP TS TS 3GPP and and USIMs “ USIM −SIM Universal “, to support support to “, SIM virtual - in 3GPP TS 21.111 and and 21.111 TS 3GPP in UMTS of SIM in networks (but 3G (but networks in 3G SIM of [GSM2006] authentication, authorisation and computation computation and authorisation authentication, servicesof future Specifiedas„ Supportsdifferent „ smartcardmultifunctionali.e. − cardsone Successor networksare downward compatibleto many SIMs) 31.102 31.102 Standardised § § § § 3a …… ... 27 Exercise 3: Exercise UniversalSIM/USIM Name the innovations introduced with the USIM. with the introduced innovationsthe Name b) 3 …… ... 28 USIM − USIM asSIM from competingfrom Visionsof new Opportunities possibly possibly − of USIM USIM „disguised“of can technically coexist on one one on coexist technically can − Reductionof operatorswitching cost UMTS activatedbyoperator services? Ü Switchingto anonymous prepaid USIM asa sensitive privacy using when option privacy Ü MultipleUSIMs providers device mobile on menu via Selection card. Marketentry § § § 3b …… ... 29 Exercise 3: Exercise UniversalSIM/USIM What is a UICC and how do USIMs relate to a a to relate USIMs do how and UICC a is What UICC? c) 3 …… ... 30 applications Files PIN SIM Files … USIM on UICC Structure − UICC onUSIM security applications Files PIN USIM PIN, application PIN, application choice, access control security applications Files PIN USIM Applications Smartcard (UICC − Universal IntegratedCircuit Card) 3c …… ... 31 Exercise 3: Exercise UniversalSIM/USIM Describemarketopportunities andeffects of USIMs. competing d) 3 …… ... 32 towards the the towards USIM −InnovationsUSIM is possible! is to SIM to on card:on from the USIM to the the to USIM the from end securityend - to - MultilateralSecurity Standardised entries Email addresses each entry for numbers & names Multiple memory More § § § § Downwardcompatible book phone Extended application thenetwork of Authentication USIM viacryptography Ü Supportformultiple applications End § § § § § 3d …… ... 33 USIM − USIM asSIM from competingfrom Visionsof new Opportunities possibly possibly − of USIM USIM „disguised“of can technically coexist on one one on coexist technically can − Reductionof operatorswitching cost UMTS activatedbyoperator services? Ü sensitive privacy using when option privacy Ü providers device mobile on menu via Selection card. Switchingto anonymous prepaid USIM asa MultipleUSIMs Marketentry …… ... 34 . eSIM Describe Apple iPad SIM, Google Fi, and Fi, Google SIM, iPad Apple Describe …… ... 35 Fi + - mini 3 (Wi iPad iPad Apple SIM Apple iPad Air 2, and Airand 2, iPad Pro, iPad operators in 90 countries worldwide. ” the desired network, which may dedicate the SIM to to SIM the dedicate may which network, desired the ” selected “ activate “ . SIMcard 5for EUR EUR. 50 for month a for data of GB 1 § § In December 2015 in US supported by by supported US in 2015 December In Cellular) or later Available since October 2014.Costs in Germany: that network allowing no further change with that SIM. that with change further no allowing network that When travelling abroad, the customer can mobile usedatafrom tariff the same SIM card for a chosen Netherlands, Spain, Sweden, Switzerland, Turkey, the UK, and the US. the and UK, the Turkey, Switzerland, Sweden, Spain, Netherlands, SIM contains credentials for several networks. must customer The Apple SIM is available for purchase in Australia, Canada, France, Germany, Italy, the the Italy, Germany, Canada, France, Australia, in SIMis Apple available purchase for § § § § § § § …… ... 36 Fi hotspots hotspots Fi and the - Mobile in theUS (joint - Google’s FiProject Google’s Refund for the unuseddata each month mobile network Monthly $20 for unlimitedcalls and texts, plusdata $10for perGB each Data tariffavailable in120+ countries In cooperation with Sprintand T SIM card) subscriber. the to partner contract the is Google 6 Nexus and 5X Nexus 6P, by Nexus supported Currently phones Seamless switch betweenavailable Wi § § § § § § § Simple price tariffs price Simple 2015) Connectivity through different operators (since April April (since operators different through Connectivity § § …… ... 37 eSIM year - Simless in 2016, Vodafone ) eSIM IoT [Heise2015,T3n2015] Embedded SIM (1) - first - worlds - ” unveils - came in 2015 by a startup called 2015called came in startup aby to enablethe deployment of – simless - eSIM slot.html - concept game changer game card - “ /12429409 eSIM sim - ) Easy to switch providers/operators to switch Easy Tariffs can becontract can programmed/limitedlimit update tothe card until theend ofcontract. programmatically to devices, e.g. a 2 without - § § www.prlog.org vendors Fears of limited customerchoice ofoperator/tariff operators) (preselected list of Business models(shifting the power from the network operators to device household devices devices household Probably a Embedded as a secure element in hardware (mobile devices, cars, cars, devices, (mobile hardware in element secure a as Embedded phone - § § § § opposedthe Uncertainties First phone with with phone First In Germany, announcedTelekom planto introduce Often calledalso VirtualSIM http:// § § § § …… ... 38 Exercise4: Mobile DevicesMobile Application Aspects Application (i) Technical characteristics Technical (i) (ii) How can mobile devices be categorized? be devices mobile can How a) 4 …… ... 39 Mobile Devices Mobile Overview comparable to a desktop PC/Laptop?) Size of theterminal/device Security features Functional completeness (Is thefunctionality § § § Technical aspects characteristics Application § § Categorisationis possibleby: § 4a …… ... 40 Technical Characteristics Categorisationof MobileDevices program and system integrity system and program Memory security, file security, access filesecurity, security, Memory control Securitymodule support, secureI/O, Terminals withTerminals external withTerminals communication external with security external modules memory Independentterminals § § § § § § Characteristics − system Operating Hardware independence § § 4a …… ... 41 Application Aspects 1 Categorisationof MobileDevices user - Feature Sets Feature InformationReaction/ tosize deviceLimitationsdue size of memorysize amountDataof integrity, communication, costs and Battery consumption, amount of data, and data, of amount consumption, Battery § § § § § the end Completenessof the functionalityfor Lifespanofapplicationan § § 4a …… ... 42 Application Aspects 2 sized“ sized“ - Categorisationof MobileDevices - Data integrity, encryptionDataintegrity, Digitalsignatures authentication control, Access Small/integrated devices „Pocket „Laptop § § § § § § Access to the security modulethe Accesssecurity to Device size Device § § 4a …… ... 43 low [Burckhardt2001] high Laptop variable Use CasesUse Based on low short/ short/ Ta b l e t medium rather rather low ? low very very high Mobile ons“per - kindsofdevices: Different requirements for different for requirements Different Frequency of cases use Duration of of Duration task per usage § Number of „Switch day 4a …… ... 44 Exercise4: Mobile DevicesMobile components do do components terminal? Name four components of mobile devices.of mobile components four Name these of two Which mobile a of size the determine considerably b) 4 …… ... 45 Mobile Devices Mobile Components of Mobile Display Means forI/O Accumulators Processors,Memory,and Storage • • • • Mainphysicalcomponents Devices • 4b …… ... 46 Size aof mobile Device displays) - mounted - InputFacilities (e.g.keyboard) OutputFacilities(e.g. display) Separationof components § § (e.g. displayin the watch, head considerably determined by its: by determined considerably The size of a mobile terminal is terminal mobile a of size The Ü § 4b …… ... 47 Exercise4: Mobile DevicesMobile Describethe functional architecture of a device. mobile c) 4 …… ...

48

Certificates Keys, User Interface Browser / Browser OperatingSystem Interpreter Application Smart Card Smart Mobile Device NFC

Near FieldCommunication (NFC) Security Radio Functional Architecture Functional− OS Interface Browser / Browser OperatingSystem Interpreter Application Link Radio Based on [Posegga2001]Basedon PAN: Bluetooth, Infrared, … System (GPS) System 4c GlobalPositioning …… ... 49 Exercise5: whatarethey – PersonalArea Networks (PAN) good for, what do they do? they do what for, good PersonalAreaNetworks (PAN) a) 5 …… ... 50 PersonalArea Network (PAN) ssociation ssociation (IrDA) connections: - A ata D : Connection of devices in short range, range, inshort devices of Connection : ed ed r nfra Bluetooth Near Field Communication (NFC) I § § § for example mobile device and printer. printer. and devicemobile examplefor Replacescable Personalenvironment, short range Purpose § § § 5a …… ... 51 Exercise5: PersonalArea Networks (PAN) technologies IRDA and Bluetooth. Name the the Name Bluetooth. and IRDA technologies and IRDA both of disadvantages and advantages Bluetooth. Please do briefly describe the related related the describe briefly do Please b) 5 …… ... 52 Infrared protocols protocols - PersonalArea Network (PAN) family for various purposes Point - - to - Remote control for consumer electronics, e.g. TVs Transmission Sales dataextraction of from cigarette vending machines mobile laptop and mobile between businessConnection cards printing § § § § § Exemplary applications: Point Protocol IrDA: Infrared Data Association IrDA: Infrared Association Data (1993): Standardized infrared (Serial Infrared) or 4 Mbit/s (Fast Infrared) Asynchronous, serial connections up to 115 kbit/s kbit/s to 115 up connections serial Asynchronous, § § § § § § 5b …… ... 53 Transmission - Infrared ° interruption. - ray misses target the ray misses - 30 - ° PersonalArea Network (PAN) angle 15 - If If theinfrared Wireless Range of up to 10 meters 10 to up of Range Illumination Sounding: connection Optical required Short interruptions theof optical connection, trains, in phone mobile and laptop between e.g. lead to complete network § § § § § § Disadvantages: Attributes: § § 5b …… ... 54 Bluetooth hoc hoc - standard - facto - PersonalArea Network (PAN) … Computer hardware Computer Software electronics Consumer § § § § connectivity (support for theInternet of Things) Broadly supported by related industries: Simple cheapand possibility to set ad up meters) to 10 (up range limited of networks official No standard, but de v4.2 (2014) improved speed, privacy, and Frequency range of 2.4 GHz § § § § § 5b …… ... 55 Headset) - Popular Bluetooth Applications Wireless communicationsWirelessdevices between (Bluetooth PersonalArea Network (PAN) Fi equipment) Fi - Soundtransmission earphones,(to headphones Hi or 5b …… ... 56 - to - Bluetooth Applications Bluetooth based based on infrared devices devices (headsets, - those those hoc networks instead of point - PersonalArea Network (PAN) hoc networks for spontaneous data spontaneous for networks hoc - Increased bandwidth (up to 865.2KBit/s) (up to bandwidth Increased No optical connection between devices necessary Expanded range (up to 10m) Allows setting up of ad connections point § § § § technology Weaknesses of infrared technology were overcome exchange similar to Applications keyboards, etc.) mice, keyboards, Settingup of ad Connection Connection of periphery § § § § 5b …… ... 57 Exercise 6: Mobile Operating Systems and Security Aspects and Security Systems Operating Mobile mobile operating systems unavailable to other other to unavailable systems operating mobile manufacturers? device What are the advantages and disadvantages of of disadvantages and advantages the are What a) 6 …… ... 58 party party - rd flexible, as 3 Less Less - device manufacturers device Mobile OS unavailable OS Mobileother to Interoperability Interoperability : Tend to be not as much affected by malware

Disadvantage software cannot beeasily installed and executed Advantage: than operating “open” systems Some manufacturers (still) rely on own OS, e.g. RIM Blackberry AppleOS, iOS. Later, more and more platforms switched to more open open to more switched platforms more and more Later, and interoperable operating systems (e.g. Windows CE, Android).OS, Originally, mobile phone most manufacturers used their Originally, own “closed” operating systems for theirmobile devices.

§ § § § § 6a …… ... 59 Exercise 6: independent mobile mobile independent - Mobile Operating Systems and Security Aspects and Security Systems Operating Mobile anufacturer operating systems. operating Name two mobile operating systemsoperatingmobile two Name unavailabletoother device manufacturers and m two b) 6 …… ... 60 device manufacturers device Mobile OS unavailable OS Mobileother to based) - 1.4 iOS 8 BlackBerry OS 10.3 Most devices equipped with Palm OS 5.4 OS Palm with equipped devices Most Latest release: Asha Asha release: Latest 2.0 release: Latest Latest release: release: Latest release: Latest Latest release: release: Latest § § § § § Samsung Nokia AshaSeries 40, BlackBerry OS Palm OS (Garnet OS) (Unix iOS Apple § § § § § 6b …… ... 61 based - = mobileOS independent independent - Sailfish OS (by ) à [WSJ2013] HTC 2“ for Symbian^3for 2“ devices Manufacturer based based - OS MeeGo (by Nokia, Intel) profit organisation Mozilla) organisation profit à - Focused Focused Mobile - CurrentlyTaiwan development by under Latest release: Sailfish OS v1.1.0.39 (October2014) v1.1.0.39 OSLatest release: Sailfish 2014) (November Latest release: 2.3 2014) (AugustLatest release: 1.4 Latest release: 5.0 (Lollipop)Latest release: 5.0 6.5.5 LatestMobile release: Windows 8.1 LatestPhone release: Windows Latest release: “Nokia Belle Feature Pack Feature BelleLatest release: “Nokia § § § § § § § § Firefox (by non Firefox OS China (by Samsung, Intel, ) (byNokia) Symbian platform Android (by Open HandsetAlliance) Linux: LiMo (Linux Mobile), Linux, Extended (Qtopia) Extended Qt Linux, Openmoko Mobile), (Linux LiMo Linux: § § § § § § § § § …… ... 62 Exercise 6: party software, what are the the are what software, party - Mobile Operating Systems and Security Aspects and Security Systems Operating Mobile rd threats resulting from this for the user? the for this from resulting threats When mobile operating systems allow the the allow systems operating mobile When execution3 of c) 6 …… ... 63 Current ThreatsCurrent from Malware on Mobile OS Mobile on Malware party software: party - rd Device malfunction data) erasing (malware data of Loss to SMS sending malware (e.g. money of Loss premium services ) Shorter battery runtime (more processing/resource usage) Malware can be executed on mobile operating operating mobile on executed can be Malware systems, either intentionally or by security leaks inside the (exploits). § § § § Ø Possiblethreats for the user are: execution3 of Manymobileoperatingsystems allowthe § § 6c …… ... 64 Timeline [ATD2013] PDA/Mobile PDA/Mobile Threats Card exploit Card - of of Mobile Malware : Telefonica Mailer SMS : Telefonica SMS unwanted : sends Flooder devices Palm on data : erases Phage : V Nokia malware OS : Symbian First : Liberty Horse Trojan : Horse Liberty Most popular target: Android target: Most popular The The number ofmalware programsmasquerading aslegitimate 02/2003 09/2004 … 08/2001 09/2001 09/2000 12/2000 mobile appsgrew by more than 600 percent in 2012 § Strong growth growth Strong § § § § § § § § Beginnings of of Beginnings Mobile Malware 6c …… ... 65 2015 - [Sophos2015] Threats Timeline 2004 PDA/Mobile 6c …… ... 66 [Sophos2015] 2011 - Threats Timeline 2004 PDA/Mobile 6c …… ... 67 2015 [Sophos2015] - Threats Timeline 2011 PDA/Mobile 6c …… ... 68 Exercise 6: operating Mobile Operating Systems and Security Aspects and Security Systems Operating Mobile systems? What are the security precautions and and precautions security the are What mobile in available countermeasures d) 6 …… ... 69 Security Precautions and Countermeasures Firewalls Checking certificates Proof Carrying Code Virus scanners Encryption Access control enforcement. their of monitoring and rights access of Definition Processes are notable toaccess the memory of other processes. § § § § § § § § the the are started by e.g. Additional Security Software may be needed, e.g. Support for security modules Secure before I/O checked is programs of Integrity management: integrity Code Access controls File File protection Memory protection Memory § § § § § § § 6d …… ... 70 Systems Mobile OperatingMobile Securityof 6d [SM14] …… ... 71 Exercise 7: Concepts Concepts of Mobile OperatingSystems an OS and what are its main goals? main its are what and OS an What is is What a) 7 …… ... 72 [SilberGalvin1999] thread, high availability, - Mobile OperatingMobileSystems : Efficient usage of the hardware the of usage Efficient : user, user, multi - : Easy usage of the actual hardware actual the of usage Easy : Multi time, … - Primary goal ofan OS OS an of goal Secondary real It enables the users to execute programs execute to users the It enables Otherproperties: An An OS is a program that serves as a mediator between and hardware. the the user § § § § What is an operating system (OS)? system anoperating isWhat § 7a …… ... 73 Exercise 7: Concepts Concepts of Mobile OperatingSystems Name three functions of the operating systemoperating of the functions three Name for (exemplifications) examples two state and eachof these functions. b) 7 …… ... 74 OS Functions OS time processing time - Resources - Processing of the communication User interface (UI) Process protection (computation to compute?” allowedtime, “Who is code, isolation): Security modulesupport Allocation of I/O Memory (RAM, Disk) memory?” the of which part “Who gets Protection of the data(memory, hard resources?” to access allowed “Who disk):is Computation time, real it take?” does much? How long how computing “Who is § § § § § § § § Securityfunctions Communication Controlling and sharing of resources of sharing and Controlling § § § 7b …… ... 75 Exercise 7: Concepts Concepts of Mobile OperatingSystems involved? What is a process? What does it do, what does does what do, it does What process? a is What system operating mobile the is how and use it c) 7 …… ... 76 Process (creation, resource distribution, etc.). distribution, resource (creation, is created or when it is running. is it when or created is The operatingsystemhas to manage theprocess The resourcesofa processareallocated while it A processuses devices. resources, I/O and files, memory, such as CPU time, A processis a program“in operation”. § § § § 7c …… ... 77 Componentsof a Process Contains Contains theglobal variables Contains Contains temporary data, such as subroutine Dynamically allocated memory parameters or return addresses, etc. Data section: Heap: Stack: § § § the code the process resides. process the code the registers: process the of Contents Programcounter: Indicates on whichpoint in More thanMore simplecode! § § § 7c …… ... 78 Exercise 7: Concepts Concepts of Mobile OperatingSystems Which are the states of a process? a of states the are Which d) 7 …… ... 79 terminated [SilberGalvin1999] I/O or event wait exit running States of a Process interrupt dispatch scheduler waiting ready admitted completion I/O or event new 7d …… ... 80 States of a Process operation - Processis terminated. Processis running. Processis waiting for results: Processis waitingfor being executed. Processis created. An event An Completion Completion an of I/O § § Terminated: Running: Waiting: New: Ready: § § § § § 7d …… ... 81

process state … [SilberGalvin1999] registers memory limits memory process number process list of open files open of list program counter program pointer ProcessControl Block (PCB) Abstracted View on a Process: a on View Abstracted block (PCB), (PCB), block neededbyan system. operating the contents of a of contents the control process Abstracted Abstracted of representation § 7d …… ... 82 ProcessControl Block (PCB) Abstracted View on a Process: a on View Abstracted : Address of the next next the of Address : Accumulator, Index Register, Register, Index Accumulator, new, ready, running, waiting,ready, new, : Counter Management State - Scheduling - CPU I/O Status I/O Status Memory Accounting § § § § StackPointer andgeneral registers Informationfor: command to be executed be to command CPURegisters: … Program Process § § § § 7d …… ... 83 Literature Concepts of Mobile Operating Systems Operating Mobile of Concepts and Systems Operating Mobile of Market Overview Smartcards Application Related and Infrastructures Devices Mobile Lecture 8: Lecture 9: Lecture 10: Lecture 11: Security Aspects § § § § This set of slides is based upon the following lectures: following the upon based is slides of set This § …… ... 84 pwc )! premises pwc chair.de pwc - & have pleasant holidays! pleasant have & Rutsch Regardingthe CaseStudy with Guten

Networking; Furthercareer opportunities at Extend your knowledge; We hope to have the presentations at We themay require registration for the event

§ § § § § Use this opportunity to your benefit Follow Follow thenews in our website (m The presentations will take place as scheduled on the the on scheduled as place take will presentations The 19th of January 2016

And finally: finally: And §

§ § …… ... 85 Thankyou! chair.de chair.de - Contact: mb1@m