…… ...

, M.Sc. ,

Yesuf Seid

Exercise 3 Exercise JohannWolfgang Goethe University Frankfurt M. a. Ahmed Chairof Mobile Multilateral & Business Security MobileBusiness I (WS 2018/19) Technology Basics II …… ... 2 References Concepts of Mobile Operating Systems Mobile of Operating Concepts Systemsand Mobile of Operating Overview Market Mobile Devices Mobile Smart cards and Related Application Infrastructures Application Related and cards Smart

Lecture 11: Lecture Aspects Security Lecture 8: Lecture 9: Lecture 10: Lecture § § § § This set of slides is based upon the following lectures: § …… ... 3 Exercise 1: Smartcards

What are smart cards and what components do do components what and cards smart are What contain)? they do (=what of consist they

a) 1 …… ... 4 and and Smartcards , , keys with with memory access control , against manipulation and and initialised I/O , protected

to their users. their to After being other data smartcards are distributed Chip operating processor Small computers with

§ § § 1a …… ... 5 main memory operating system application data Smartcards RAM ROM EEPROM Smartcard CPU Access Access Control I/O Clk RST Vcc Vpp GND [Source: SecCommerce2002] power supply ground

in/output

reset signal clock signal

1a

power programming …… ... 6 Exercise 1: Smartcards

(ii)applications? smartcards play with respect to to respect with play smartcards (i)security Why are they used and what role do do role what and used they are Why

b) 1 …… ... 7 Smartcards ofdata for(e.g. keys, in insecure insecure in security

Smartcard applications for PC Smartcards for mobile communication (SIMs) Signature cards according to German Signature Law Phone cards of Deutsche Telekom

§ § § § Examples: payment) is neededis payment) environments Usedwhen control, access physical signatures,

§ § 1b

…… ... 8

Examples − Smartcards 1b …… ... 9 Why Smartcards?

„Cracking“ of credentials fraud Billing Duplication of a user’s credentials Duplicationofa user’s Unauthorisedusageservices of through data user forged

§ § § § Protection needed against: 1b

…… ... 10

user IDs user intercepted Duplication of of Duplication design(CDMA) faultysystem Example for 1b …… ... 11 Exercise2: Subscriber Identity Module (SIM) Module Identity Subscriber

UMTSnetworks. Name the most important function of the the of function important most the Name and GSM in (SIM) Module Identity Subscriber

a) 2 …… ... 12 cf. [EffingRankl2008] Communication provided by the provided by i K Smartcards for Mobile key key subscriber identification identification subscriber for for IMSI) serve as security medium. medium. security serve as ( encryption resistance prevents counterfeiting. counterfeiting. prevents resistance - Smartcards: InternationalMobile Subscriber

s are are s

Tamper design robust SIM SIM cards the mobile the and the the and operator mobile Identity

Reliably execute computational functions for Contain Contain SIM 2a …… ... 13 Module (SIM) Module to to The Subscriber Identity a “phone” “phone” a Identity between subscriber & Module” to reflect progress progress reflect to Module” contract

the network by linking it to a to it linking by network the

Management (identification) subscription (authentication)subscription Identification in the fieldgeneral of network operator network use upcoming for WLAN for upcoming

More and more called “Subscriber “Subscriber called more and More

Authenticates and authorizes authorizes and Authenticates Represents Represents In GSM and UMTS since 1991, UMTS since GSMIn and 2a …… ... 14 Exercise2: Subscriber Identity Module (SIM) Module Identity Subscriber Subscriber Identity Module Module Identity Subscriber

protected, which are not andwhy? not are which protected, What does the the does What are contents these of Which contain?

b) 2 …… ... 15 SIM Card Content (Extract)

User data (address book, telephone list,SMS memory) book,(address telephone data User Frequency information Frequency (session) keys generated Dynamically Attributes of GSM login Cell information Cell A3, A8 crypto algorithms for signing and encryption and signing for algorithms crypto A8 A3, services subscribed of List subscriber the by used Language IMSI, PIN, PUK PIN, IMSI,

§ § § § § § § § § Dynamic data: Dynamic Protected data:

§ § 2b …… ... 16 Exercise2: Subscriber Subscriber Subscriber Identity Module (SIM) Module Identity Subscriber

Name other functionalities of the the of functionalities other Name IdentityModule.

c) 2 …… ... 17 of

− − SIM: Functionality “ for GSM cryptography cryptography - configuration data configuration billing of issuer of the card card the of issuer identity card identity secure billing of roaming by roaming partner. roaming by SIM through

SIM contains additional additional contains SIM system. GSM the subscribers issuer. card for important subscribers for allows SIM SIM identifies the the identifies SIM the for important SIM serves as „ as serves SIM subscribers. phone cellular

§

§ § § 2c …… ... 18 cf. [EffingRankl2002] Communication Smartcards for Mobile for subscriber identification identification subscriber for provided by the mobile the provided by i K serve as security medium. medium. security serve as IMSI) resistance prevents counterfeiting. counterfeiting. prevents resistance Smartcards: - ( InternationalMobile Subscriber s are are s

Tamper Robust design SIM SIM cards

§ § § Reliably execute computationaldevice mobile the functions for and the key key the and operator Contain Contain Identity SIM

§ § § 2c …… ... 21 Exercise2: Subscriber Identity Module (SIM) Module Identity Subscriber application examples for SIM SIM for examples application

) What) does it do?

i (ii)Name Toolkit. Application What is SIM Application Toolkit? Application SIM is What (

d) 2 …… ... 22 Phones on aon actions specifies specifies - SIM commands SIM orexecute standard standard usedfor accessing the files SIM: Integration intoMobile [GSM2006] additional applications

serial interface is

„SIM Application Toolkit“ (STK) allows for ApplicationToolkit“ „SIM implementing SIM. Devicecan access commands. SIM through card. through Communication electricalasas well software interfaces anddevice.betweenSIM A ETSI GSM 11.11 GSM ETSI

§ § § § § 2d …… ... 23 SAT − for interacting Value Added Services for SIM Application Toolkit Toolkit Application SIM programmable SIMs programmable 1996 11.14,GSM as ETSI extended security functionality security I/O, Telephony, Download Telephony, I/O, an interface [GSM2006]

„Living standard“ Allows for 1999 Controls with mobile devices with mobile Standardised Provides on implemented

§ §

§ § § 2d …… ... 24 Application Examples − SAT SAT Brokerage via cellular phone and of users trying to access servers Online SMS banking Online - based servicesbased -

Mobile and T Mobileand - ATM search, navigation search, ATM Mobilesignatures T

§ § § Security applications in general applications in general Security Location Secure payment Secure Authentication

§ § § § § 2d …… ... Exercise2e: Secure Element Secure

Describethe role and functionality of the UICC element. secure a as e) 2e …… ... Exercise2e: Secure Element Secure secure storage and execution execution and storage secure

Can provide software to “emulate” a “emulate” to software provide Can normalbank card to process payment information Importantfunctionality for securee.g. payment mobile

• • Itprovides environment. phone’s hardware, or in a SIM/UICC card aSIM/UICC in hardware,or phone’s operator. network your providedby In today’s , a Secure Element can today’s In the into embeddedasachip directly found be

• • 2e …… ... 27 Exercise3: UniversalSIM/USIM

What is a USIM? a is What

a) 3 …… ... 28 on USIM − SIMs 3GPP TS 3GPP and and USIMs “ Universal SIM “, to support SIM virtual - in 3GPP TS 21.111 and 21.111 TS 3GPP in UMTS i.e. multifunctional smartcard ofSIM networks in (but 3G − [GSM2006]

authentication, authorisation and computation computation and authorisation authentication, offuture services onecards „ as Specified SIMs) „ different Supports Successor networksare downward compatible to many Standardised 31.102

§

§ § § 3a …… ... 29 Exercise3: UniversalSIM/USIM

Name the innovations introduced with the the with introduced innovations the Name USIM.

b) 3 …… ... 30 − USIM USIM Visions of new Opportunities several mini applications applications several mini - ; etc

number, number, thousands of contacts instead of a maximum255SIMa a of in of instead contacts of thousands phone third or second a emailaddresses, contain can

§ § Larger, richer phonebook Larger, Better security (new encryption algorithm) for calls, calls, for algorithm) encryption (new security Better data, and storage A 3G (UMTS) handset equippedbe used maketo video calls, assuming the calling with a USIM cardarea is covered by a 3G network can Tiny computer

§

§ § § 3b …… ... 31 Exercise3: UniversalSIM/USIM

What is a UICC and how do USIMs relate to a to relate USIMs do how and UICC a is What UICC?

c) 3 …… ... 32 Exercise3: UniversalSIM/USIM application and in a UMTS network it is the the is it network UMTS a in and application USIMapplication. GSM and UMTS networks. aIn GSM network, the UICC contains a SIM The Universal The Integrated Circuit Card (UICC) in terminals mobile in used card smart the is

• • What is a UICC and how do USIMs relate to a to relate USIMs do how and UICC a is What UICC?

c) 3 …… ... 33 Structure − applications Files PIN SIM Files … USIM on UICC UICC on USIM security applications Files PIN USIM Universal Integrated Circuit Card) Circuit Integrated Universal −

PIN, application choice, access control security applications

Files PIN USIM Applications Smartcard (UICC (UICC Smartcard 3c …… ... 34 Exercise3: UniversalSIM/USIM

Describemarket opportunities and effects of USIMs. competing

d) 3 …… ... 35 Innovations − towards the the towards USIM USIM is possible! is to SIM to on card:on from the USIM to the the to USIM the from end security end - to -

Multilateral Security Multilateral Standardised entries Multiple names & numbers for each entry More memory Email addresses

§ § § § Extended phone book USIMvia cryptography Ü Downwardcompatible application network the of Authentication Support for multiple applications multiple for Support End

§ §

§ § § 3d …… ... 36 − USIM USIM as SIM as from competing Visions of new Opportunities possibly − ofUSIM „disguised“ can technically coexist on one −

Reduction of operator switching cost UMTSactivated operatorby

privacy option when using privacysensitive using when privacyoption services? providers device mobile on viamenu Selection card. Ü Ü

Switching to anonymous prepaid USIM as a as USIM prepaid anonymous to Switching

Multiple USIMs Multiple Market entry Market …… ... 37 Exercise 4: Mobile Devices Mobile Application Aspects Application

(ii) How can mobile devices be categorized? be devices mobile can How characteristics Technical (i)

a) 4 …… ... 38 Mobile Devices Mobile Overview Size of the terminal/device Security features Functional completeness (Is the functionality comparable to a desktop PC/Laptop?) § § §

Applicationaspects Technical characteristics

§ § Categorisation is possible by: § 4a …… ... 39 Technical Characteristics Technical Characteristics − Categorisation Mobile of Devices

Security module support, secure I/O, I/O, secure support, module Security integrity andsystem program Memory security, file security, access security, file security, Memory control Terminals with external memory Terminals withTerminals external with communication external security modules Independentterminals

§ § § § § § Operating system system Operating Hardware independence Hardware

§ § 4a …… ... 40 Application Aspects 1 Aspects Application Categorisation Mobile of Devices user -

Limitations due to device size Sets Feature InformationReaction / and costs and size of memory memory of size amount ofcommunication, Dataintegrity, Battery consumption, amount of data, andof amount consumption, Battery

§ § § § § the end the Completeness the of functionality for Lifespan of an application an of Lifespan

§ § 4a …… ... 41 Application Aspects 2 Aspects Application sized“ sized“ Categorisation Mobile of Devices - -

Accessauthenticationcontrol, Data integrity, encryption Dataintegrity, Digitalsignatures „Laptop Small / integrated devices integrated / Small „Pocket

§ § § § § § Access to the security module Devicesize

§ § 4a …… ... 42 low [Burckhardt2001] high Laptop variable UseCases Based on low Tablet short/ short/ medium rather low rather ? low very high Mobile ons“ per ons“ -

kinds devices: of Differentrequirements differentfor

usecases Frequencyof Duration of of Duration pertask usage

§ „Switch day Numberof 4a …… ... 43 Exercise 4: Mobile Devices Mobile components do do components

terminal? Which two of these of two Which mobile a of size the determine considerably Name four components of mobile devices. mobile of components four Name

b) 4 …… ... 44 Mobile Devices Mobile Components Means for I/O for Means Processors, Memory, and Storage Display Accumulators

• • • Devices • Main physical components of Mobile Mobile of components physical Main • 4b …… ... 45 Size of a mobileDevice displays) - mounted - InputFacilities keyboard)(e.g. display) Facilities Output (e.g.

Separation of components § §

head (e.g. display in the watch, considerably determined considerably its: by The size a of mobile terminal is Ü § 4b …… ... 46 Exercise 4: Mobile Devices Mobile

Describethe functional architecture of a device. mobile

c) 4 …… ...

47

Certificates Keys, Browser / Operating System Operating Interpreter Application Smart Smart Card Mobile Device Mobile NFC

Near Near Field Communication (NFC) Security Functional Architecture Functional − Radio OS OS Interface Browser / Operating System Operating Interpreter Application Link Radio Basedon [Posegga2001]

PAN:

Bluetooth, Infrared, … System (GPS)

4c Global Positioning …… ... 48 Exercise 5: what are they they are what – PersonalArea Networks (PAN)

PersonalArea Networks (PAN)do? they whatdo for, good

a) 5 …… ... 49 PersonalArea Network (PAN) ssociation (IrDA) ssociation connections: - A ata D : Connection: ofdevices in short range, ed ed r nfra Near Field Communication (NFC) Communication Field Near I Bluetooth

§ § §

Replaces cable Purpose printer. and device mobile example for Personal environment, short range

§ § § 5a …… ... 50 Exercise 5: PersonalArea Networks (PAN)

Bluetooth. technologies IRDA and Bluetooth. Name the the Name Bluetooth. and IRDA technologies and IRDA both of disadvantages and advantages Please do briefly describe the relateddescribe the briefly Pleasedo

b) 5 …… ... 51 Infrared protocols protocols - PersonalArea Network (PAN) family for various purposes Point - - to -

Sales data extraction from cigarette vending machines machines vending cigarette from extraction data Sales laptop mobileand between Connection Wireless printing Remote control for consumer electronics, e.g. TVs Transmission of mobile business cards mobile business of Transmission

§ § § § § Exemplary applications: Point Protocol IrDA: Infrared Data Association (1993): IrDA: Infrared Data Standardized infrared (Serial Infrared) or 4 Mbit/s (Fast Infrared) (Fast Mbit/s 4 or Infrared) (Serial Asynchronous, serial connections up to 115 kbit/s

§ § § § § § 5b …… ... 52 Transmission - Infrared interruption. - ray misses the target the misses ray - 30 - PersonalArea Network (PAN) angle 15angle - If theIf infrared

Wireless Range of up to 10 meters to up of Range Illumination e.g. between laptop and mobile phone in trains, trains, in phone mobile and laptop between e.g. network complete to lead Optical connection required Short interruptions of the optical connection, Sounding:

§ § § § § § Disadvantages: Attributes:

§ § 5b …… ... 53 Bluetooth hoc hoc - standard - facto - PersonalArea Network (PAN)

Software electronics Consumer … Computer hardware Computer

§ § § § Broadly supported by related industries: related by supported Broadly No official standard, but de but standard, official No and v4.2 (2014) improved speed, privacy, connectivity (supportThings) for the Internet of Simple and cheap possibility to set up ad 10 (up to meters) range limited of networks Frequency range of 2.4 GHz

§ § § § § 5b …… ... 54 Headset) - Popular Bluetooth Applications Bluetooth Popular Wireless communications between devices devices between Wirelesscommunications (Bluetooth PersonalArea Network (PAN)

Fi equipment) Fi -

or Hi or (to earphones, headphones earphones, (to Sound transmission Sound 5b …… ... 55 - to - Bluetooth Applications Bluetooth devices (headsets, - hoc networks instead of point of instead networks hoc - PersonalArea Network (PAN) hoc networks for spontaneous data data spontaneous for networks hoc -

point connections Increased bandwidth (up to 865.2KBit/s) to (up bandwidth Increased necessary devices between connection optical No 10m) to (up range Expanded ad of up setting Allows

§ § § § Applications similar to those based on infrared technology Weaknesses of infrared technology were overcome Setting up of ad exchange Connection of periphery etc.) mice, keyboards,

§

§ § § 5b …… ... 56 Exercise 6: Exercise Mobile Operating Systems and Security Aspects Security Systemsand MobileOperating

devicemanufacturers? What are the advantages and disadvantages of of disadvantages and advantages the are What other to unavailable systems operating mobile

a) 6 …… ... 57 party - rd Less flexible, as 3 - device manufacturers device Mobile OS unavailable to other other to unavailable OS Mobile

: Interoperability Interoperability : Tend to be not as much affected by malware

Disadvantage easily be executed installed and cannot software than “open” operating systems Advantage: Blackberry OS, Apple iOS. Apple OS, Blackberry Some manufacturers (still) rely on own OS, e.g. RIM OS, Android). Symbian OS, Later, more and more platforms switched to more open Later, and interoperable operating systems (e.g. CE, Windows own “closed” operating systems for their mobile devices. Originally, most mobile phone manufacturers Originally, used their

§ §

§ §

§ 6a …… ... 58 Exercise 6: Exercise independent mobile mobile independent - Mobile Operating Systems and Security Aspects Security Systemsand MobileOperating anufacturer

two m two operatingsystems. Name two mobile operating systems operating mobile two Name unavailableto other device manufacturers and

b) 6 …… ... 59 device manufacturers device Mobile OS unavailable to other other to unavailable OS Mobile Asha based) - 1.4 iOS 12 iOS BlackBerry OS 10.3 Most devices equippedOS 5.4with Palm

Latest release: 2.0 release: Latest Latest release: Asha Asha release: Latest Latest release: release: Latest Latest release: release: Latest Latest release: release: Latest

§ § § § §

Samsung Nokia , 40, Series Nokia BlackBerry OS BlackBerry Apple iOS (Unix Palm OS (Garnet OS)

§ §

§ §

§ 6b …… ... 60 based - = mobileOS independent - SailfishOS(by ) à [WSJ2013] HTC Manufacturer 2“ for Symbian^3 devices based - OS MeeGo(byNokia, Intel) profitorganisation Mozilla) à - Focused Mobile Focused -

Currently under development by Taiwan by development under Currently Latest release: 1.4 (August 2014) (August 1.4 release: Latest Latest release: Sailfish OS v1.1.0.39 (October 2014) (October v1.1.0.39 OS Sailfish release: Latest 2014) (November 2.3 release: Latest Latest release: 6.5.5 Mobile Windows release: Latest 8.1 Phone Windows release: Latest Latest release: 5.0 (Lollipop) 5.0 release: Latest Latest release: “Nokia Belle Feature Pack Feature Belle “Nokia release: Latest

§ § § § § § § § China Firefox OS (by non (by OS Firefox (by Samsung, Intel, ) (byNokia) Windows Mobile Android (by ) Handset Open (by Android Symbianplatform Linux: LiMo (Linux Mobile), Linux, Extended (Qtopia) Extended Qt Linux, Openmoko Mobile), (Linux LiMo Linux:

§

§ §

§ §

§ §

§ § …… ... 61 Exercise 6: Exercise party software,whatpartythe are - Mobile Operating Systems and Security Aspects Security Systemsand MobileOperating rd

threats resulting from this for the user? the for this from resulting threats When mobile operating systems allow the the allow systems operating mobile When 3 of execution

c) 6 …… ... 62 Current Threats from Current Malware on Mobile OS party software:party - rd

Shorter battery runtime (more processing/resource usage) Loss of data (malware erasing data) Loss of money (e.g. malware sending SMS to premium services ) Device malfunction Device Malware can be executed on mobile operating leaks by security or either intentionally systems, (exploits). system operating mobile the inside

§ § § § Ø

Possible threats for the user are: Many mobile operating systems allow the the allow systems operating mobile Many 3 of execution

§ § 6c …… ... 63 Timeline [ATD2013] PDA/Mobile ThreatsPDA/Mobile Card exploit Card - of Mobile Malware Mobile of

: Flooder sends unwanted SMS unwanted sends :Flooder devices Palm on data erases :Phage :Nokia V Symbian:OS malware First : Liberty Horse Trojan Horse :Liberty SMS Mailer Telefonica :

Most popular target: Android target: Mostpopular The number of malware programs masquerading as legitimate aslegitimate masquerading programs malware of number The

… 02/2003 09/2004 09/2001 08/2001 09/2000 12/2000 § mobile apps grew by more than 600 percent in 2012in 600 percent than more by grew mobileapps § Strong growth § § § § § § § Beginnings Beginnings of Mobile Malware 6c

…… ... 64 2015 - [Sophos2015] Timeline 2004 PDA/Mobile Threats PDA/Mobile 6c …… ... 65 [Sophos2015] 2011 - Timeline 2004 PDA/Mobile Threats PDA/Mobile 6c …… ... 66 2015 [Sophos2015] - Timeline 2011 PDA/Mobile Threats PDA/Mobile 6c …… ... 67 Exercise 6: Exercise operating Mobile Operating Systems and Security Aspects Security Systemsand MobileOperating

systems? What are the security precautions and and precautions security the are What mobile in available countermeasures

d) 6 …… ... 68 Security and Countermeasures Precautions Virus scanners Firewalls Checkingcertificates Proof Carrying Code Definitionaccessof rights and monitoring theirof enforcement. Encryption control Access Processes are not able to access the memory of other processes.

§ § § § § § § §

Additional Security Software may be needed, e.g. needed, may be Software Security Additional Code integrity management: Integrity of programs is checked before before is checked programs of Integrity management: integrity Code e.g. by started are the Support for security modules security for Support I/O Secure Access controls Memory protection Memory protection File

§ § § § § § § 6d

…… ... 69

Systems Security of Mobile Operating 6d [SM14] …… ... 70 Exercise 7: Concepts of Mobile Operating Systems

What is an OS and what are its main goals? main its are what and OS an is What

a) 7 …… ... 71 [SilberGalvin1999] thread, high availability, availability, high thread, - Mobile Operating Systems Operating Mobile : Efficient usage of the hardware the of usage :Efficient user, multi user, - : Easy usage of the actual hardware actual the of :Easy usage Multi time, … -

Primary goal of an OS Secondary goal of an OS Otherproperties: real An OS is a program that serves as a mediator between the user user the between mediator asa serves that OSis program a An hardware. the and programs execute to users the Itenables

§ § § § § What is an operating system (OS)? 7a …… ... 72 Exercise 7: Concepts of Mobile Operating Systems

each of thesefunctions.eachof Name three functions of the operating system operating the of functions three Name for (exemplifications) examples two state and

b) 7 …… ... 73 OS Functions OS timeprocessing - Resources -

Securitymodule support I/O of Allocation Processing of the communication User interface (UI) Protection of the resources?” data access to allowed is “Who (memory, hard disk): Process protection compute?” (computationto allowed is “Who time, code, isolation): Computationtime, real take?” it does long How much? how computing is “Who Memory(RAM, Disk) memory?” the of part which gets “Who

§ § § § § § § § Security functions Security Communication Controlling and sharing of resources of sharing and Controlling § § § 7b …… ... 74 Exercise 7: Concepts of Mobile Operating Systems

what does it use and and use it does what howis the involved? What is a process? process? a is What do, it does What

c) 7 …… ... 75 Process

(creation,resource distribution, etc.). is created or when it is running. is it when or created is operating The system has tomanage theprocess memory, files, and I/O devices. I/O and files, memory, resourcesa of processThe are allocated while it A process is a program “in operation”.time, as CPU such resources, usesprocess A

§

§ § § 7c …… ... 76 Components a of Process Contains the global variables Contains temporary data, such as subroutine Dynamically allocated memory allocated Dynamically Heap: Data section: Stack: parameters or return addresses, etc.

§ § § Contents of the process registers: process the of Contents the code the process resides. process the code the More than simple code! simple than More Program counter: Indicates on which point in

§ § § 7c …… ... 77 Exercise 7: Concepts of Mobile Operating Systems

Which are the states of a process? a statesof the are Which

d) 7 …… ... 78 terminated [SilberGalvin1999] I/O or event wait exit running States of a Process interrupt dispatch scheduler waiting ready

admitted

completion I/O or event new 7d …… ... 79 States of a Process operation - Process is terminated. Process is running. Process is waiting for results: Process is waiting for being executed. Process is created.

An event Completion of an I/O

§ §

Terminated: Waiting: Ready: Running: New:

§ § § § § 7d …… ... 80

process state … [SilberGalvin1999] registers memory limits memory process number process list of open files of open list program counter pointer Process Control Block (PCB) Block Control Process Abstracted View on a Process: on Abstracted View

operatingsystem. block (PCB), (PCB), block neededbyan representation of a of contents the control process Abstracted § 7d …… ... 81 Process Control Block (PCB) Block Control Process Abstracted View on a Process: on Abstracted View : Addressofthe next : Accumulator, Index Register, Register, Index Accumulator, new, ready, running, waiting, ready, new, : Counter Management - State Scheduling -

CPU Memory I/OStatus Accounting

§ § § §

Informationfor: CPU Registers: CPU registers general and Pointer Stack Program executed be to command Process …

§

§ § § 7d …… ... 82 References Concepts of Mobile Operating Systems Mobile of Operating Concepts Systemsand Mobile of Operating Overview Market Mobile Devices Mobile Smartcards and Related Application Infrastructures Application Related and Smartcards

Lecture 11: Lecture Aspects Security Lecture 8: Lecture 9: Lecture 10: Lecture § § § § This set of slides is based upon the following lectures: § …… ... 83 ! chair[dot]de - Thank Thank you mob1[at]m