Mobile Security R&D Program Guide - Dhs.gov

Transcription

Mobile SecurityR&D Program GuideVolume 1

This page intentionally left blank.

WelcomeThank you for your interest in the U.S. Department of Homeland Security (DHS) Science and Technology Directorate’s(S&T) Mobile Security Research and Development (R&D) Program. This guide introduces you to the goals and objectivesfor Mobile Security R&D, its alignment with DHS and federal mobile security strategies and priorities, and provides aview into S&T’s exploration of new and cutting edge mobile security R&D. We are excited to share these promising mobilesecurity technologies with you and welcome your feedback.Through targeted mobile security R&D, S&T seeks to accelerate the adoption of secure mobile technologies bygovernment and industry to address mobile cybersecurity needs and protect the Homeland Security Enterprise. This guiderepresents the important contributions of the Mobile Device Security (MDS) Program in achieving the Digital GovernmentStrategy goal of “Building a 21st Century Platform to Better Serve the American People .“ Mobile security R&D is intendedto address security gaps and barriers and accelerate the adoption of secure mobile technologies into the federalgovernment. The MDS Program goals are to apply R&D to: Enable a secure mobile workforce Enable mission success through effective and efficient technologiesThis technology guide, which will be updated and published annually, features 13 new technologies. To help direct futurepublications, please reflect on the mobile security capability gaps in your own organization, and share your thoughts withthe DHS S&T MDS Program Manager (email Vincent Sritapan). Your input is critical to identify timely solutions and toinform future research efforts. It is our pleasure to introduce you to the MDS program and these newly developed mobilesecurity tools resulting from government funding.Sincerely,Douglas MaughanDHS S&T Cyber Security DivisionDirectorVincent SritapanDHS S&T - Cyber Security DivisionMDS Program Manager

Contents

CYBER SECURITY DIVISION1MOBILE DEVICE SECURITY (MDS) PROGRAM STRATEGY4SOFTWARE BASED MOBILE ROOTS OF TRUST9BLUE RISC11GALOIS13DEF-LOGIX15MOBILE INSTRUMENTATION16HRL LABORATORIES17KRYPTOWIRE19NORTHROP GRUMMAN21UNITED TECHNOLOGIES RESEARCH CENTER25TRANSACTIONAL SECURITY METHODS27RUTGERS UNIVERSITY28NEXT-GEN MOBILE SECURITY MANAGEMENT TOOLS30IBM31UNIVERSITY OF NORTH CAROLINA AT CHARLOTTE32MOBILE DEVICE LAYER PROTECTION34INTELLIGENT AUTOMATION INC.35MOBILE APP SECURITY37KRYPTOWIRE LLC39CONCLUSION41

Department of Homeland SecurityScience and Technology DirectorateCyber Security DivisionThe Cyber Security Division is aKey Component in the President’sNational StrategyThreats on the Internet change fast and cybersecurityis one of the most challenging areas in which theFederal government must keep pace. Next-generationcybersecurity technologies are needed to enhance thesecurity and resilience of the nation’s current and futurecritical infrastructure and the Internet.In the Department of Homeland Security (DHS) Science& Technology Directorate (S&T), the CSD enables andsupports research, development, testing, evaluation, andtransition for advanced technologies in cybersecurityand information assurance. This full lifecycle of activitiesevolved in response to the President’s National Strategyto Secure Cyberspace and the Comprehensive NationalCybersecurity Initiative (CNCI).The S&T Cyber Security Division addresses theseobjectives by: Discovering new solutions for emerging cybersecuritythreats to the nation’s critical infrastructure; Driving security improvements to close criticalweaknesses in today’s technologies and emergingsystems; and Delivering new, tested technologies to defend againstcybersecurity threats and making them available to allsectors through technology transfer and other methods.CSD Focuses on Critical Vulnerabilitiesin the Cyber Security LandscapeInternet Infrastructure Security—Developing securityprotocols for the existing Internet infrastructure (browsersand routers, essential to daily Internet operation) so thatusers are not redirected to unsafe websites or pathwaysby malicious actors.Critical Infrastructure/Key Resources—Securing theinformation systems that control the country’s energyinfrastructure including the electrical grid, oil and gasrefineries, and pipelines, to reduce vulnerabilities as legacy,standalone systems are networked and brought online.National Research Infrastructure—Providing theinfrastructure that enables development and testing oftechnologies to address cybersecurity issues includingbotnets, worm propagation and defense, and denial-ofservice defenses that protect Internet websites againstattack; providing a data repository to support thecybersecurity research community.The CNCI establishes a multi-pronged approach theFederal government will take in identifying current andemerging cyber threats, shoring up current and futurevulnerabilities in telecommunications and cyberspace,and responding to or proactively stopping entities thatwish to steal or manipulate protected data on secureFederal systems.1Leap-Ahead Technologies—Develop “leap-ahead”technologies that will achieve orders-of-magnitudeimprovements in cybersecurity. One of CNCI’s goalsis to achieve a reliable, resilient, and trustworthydigital infrastructure.S&T CYBER SECURITY DIVISION MOBILE SECURITY R&D PROGRAM GUIDE

Our vision is a cyberspace that supports a secure and resilientinfrastructure, that enables innovation and prosperity, and thatprotects privacy and other civil liberties by design. It is one in whichwe can use cyberspace with confidence to advance our economicinterests and maintain national security under all conditions.— Quadrennial Homeland Security Review, 2010Cyber Security Education—Helping to foster adequatetraining and education programs critical to the nation’scybersecurity needs by providing opportunities for highschool and college students to develop their skills and bygiving them access to advanced education and exercisesthrough team competitions.Identity Management—Evaluating and developingproof-of-concept solutions, and conducting pilotexperiments of identity and access control architecturesand technologies, as well as data privacy protectiontechnologies for the homeland security community.S&T: Preparing for Next-GenerationCyber ThreatsIn the coming years, several cybersecurity challengesmust be addressed. The most critical of these includeEnterprise-Level Metrics, Combating Insider Threats,Combating Malware and Botnets, Digital Provenance,Situational Understanding and Attack Attribution, andUsable Security.Cyber Forensics—Developing new cyber forensic analysistools and investigative techniques to help law enforcementofficers and forensic examiners address cyber-relatedcrimes.Software Assurance—Developing tools, techniques, andenvironments to analyze software, address the presence ofinternal flaws and vulnerabilities in software, and improvesoftware security associated with critical infrastructure(energy, transportation, telecommunications, banking andfinance, and other sectors).S&T CYBER SECURITY DIVISION MOBILE SECURITY R&D PROGRAM GUIDE2

Mobile Device Security (MDS)Program Strategy

Mobile Device Security Program StrategyVisionThe Department of Homeland Security (DHS) workforcehas become increasingly mobile, driving the need forsecure mobility solutions and a coordinated approach andframework to guide the selection and implementation ofcommon enterprise mobility solutions. To promote thesafe and secure adoption of mobile technology in DHS andthe federal government, the DHS Science and TechnologyDirectorate (S&T) Cyber Security Division (CSD) within theHomeland Security Advanced Research Project Agency(HSARPA) created the Mobile Device Security (MDS) Program,and adopted the following vision to guide its research efforts:MOBILE DEVICE SECURITY PROGRAM VISIONAccelerate the adoption of secure mobile technologies by theDepartment, the government, and the global communityContextMobile Technology, recognized as a cornerstone of the2012 White House Federal Digital Government Strategy(DGS), seeks to enable “access to quality digital governmentinformation and services anywhere, anytime, on any device.”The DGS acknowledges new and unique security and privacychallenges must be met to accelerate the adoption of mobiletechnology into the federal government. In addressing DGSchallenges, interagency efforts resulted in developmentof security requirements for mobile computing andidentification of major barriers and gaps that impede mobileadoption. The mobile challenge areas identified were MobileDevice Management, Mobile Application Management,Identity and Access Management, and Data Protection.Though progress has been made in these areas, moreneeds to be done to address current and especiallyemerging challenges.Two factors conspire to create the urgent need for secureenterprise solutions. First, the use of mobile solutionsis rapidly increasing across the Department and thefederal government. Secondly, mobile threats present anincreasingly common and more sophisticated threat to datastored or processed on DHS devices. Threats to mobiledevices, applications, and data have grown dramatically inthe past few years. A recent analysis of threats1 highlightedseveral key developments, including the following.5Elements of a Mature Mobile Ecosystem Malware grew substantially in the U.S., driven by anincrease in threats holding devices and data hostage inexchange for payment (ransomware). Mobile threat sophistication is increasing. Certain malwarehas even entered the marketplace pre-installed on certaindevices, indicating a compromised supply chain. Malwareself-defense mechanisms are also gaining sophistication,evading attempts to detect and defeat the application. A mature mobile ecosystem comprises many elements,as shown below. Each of these areas presents securitychallenges and opportunities for additional study andmobile security research and development (R&D).ObjectivesTo respond to the evolving threats and security challengesin the mobile space, S&T CSD has developed andwill transition programs directed at several strategicobjectives and initiatives. Through this work, S&T willensure DHS is poised to bridge current capability gaps anddeploy solutions that effectively, efficiently, and securelyenable the mission of the Department. The MDS Programhas established three overarching objectives as it seeks toachieve the program vision:S&T CYBER SECURITY DIVISION MOBILE SECURITY R&D PROGRAM GUIDE

MOBILE DEVICE SECURITY PROGRAM OBJECTIVES1: Partner with DHS Components and federal stakeholders toidentify operational requirements and capability gaps2: Develop secure mobile solutions to enhance the DHS mission3: Partner with industry to foster innovationStrategic AlignmentThe objectives and initiatives of the MDS Program alignwith DHS, S&T, and federal strategies and priorities. TheDHS S&T 2015-2019 Strategic Plan addresses the goalsand objectives necessary to deliver effective and innovativeinsight, methods, and solutions for the critical needs ofthe Homeland Security Enterprise (HSE). The plan’s threestrategic objectives were specifically designed to addressthe environment the Government operates within today,and MDS Program goals directly align with Objectives 1 and2. These objectives and their respective initiatives are:1. Deliver Force Multiplying Solutions:– Identify and prioritize operational requirementsand capability gaps– Make strategic investments in high-impact,priority areas– Partner with the HSE2. Energize the Homeland Security Industrial Base (HSIB)– Optimize markets by pooling demand anddeveloping standards– Engage the HSIB through a deliberate, continuous,and transparent approach– Improve programs designed to increase collaborationwith innovative companiesThe Program also directly aligns with two key goalsand objectives of the DHS Information TechnologyStrategic Plan2 :Goal 2: Innovative Technology– Objective 2.4: Enable end-to-end delivery ofmobile solutions that enhance enterprise-widemobile computing capabilities for successfulmission outcomes.Goal 4. Cybersecurity– Objective 4.2: Enable secure communications toeffectively support the mission of DHS and its partners.Mobile technology by its nature allows the end user accessto data that might not otherwise be available. Ensuringaccess to data and services ‘anywhere, anytime’ is oneaspect of the targeted mobile security R&D and alignsspecifically with Objective 2.4. Mobile security R&D isheavily focused on ensuring secure delivery of data and/orservices, consistent with Objective 4.2.The Office of Management and Budget’s CybersecurityStrategy and Implementation Plan (CSIP ) also addressesthe need for mobile security as an imperative. Thisdocument notes that “Mobile devices have become aspowerful and connected as desktop and laptop computers,requiring the same level of attention to cybersecurity.Mobile security has unique challenges that requiredifferent solutions than existing programs offer. [Potentialsolutions] could address authentication, applicationmanagement, device management, and encryption,and may include approved tools, best practices, andimplementation support.”Finally, it should be noted that the MDS Program isdirectly aligned to the requirements of DHS componentsand missions elicited through multiple sources, asnoted below.Initiatives to Address ObjectivesOBJECTIVE 1. Partner with Components and FederalStakeholders to Identify Operational Requirementsand Capability GapsTo achieve Objective 1, the MDS Program leveragesthe efforts of existing federal and DHS mobility workinggroups to gather and prioritize mobile security capabilitygaps preventing mobile implementations both at thefederal level and across the HSE. These groups includethe following federal and DHS working groups:Federal Interagency Working Groups Federal Chief Information Officers (CIO) Council’sInformation Security and Identity ManagementCommittee (ISIMC) Mobile Technology TigerTeam (MTTT) ISIMC Identity, Credential and Access ManagementSub-Committee (ICAMSC) MTTT Mobile Application Security Vetting Working GroupS&T CYBER SECURITY DIVISION MOBILE SECURITY R&D PROGRAM GUIDE6

DHS Mobility Working Groups Common Enterprise Mobility Tiger Team Mobility Initiative-5 (mi-5) Mobile Community of PracticeOBJECTIVE 2: Develop Secure Mobile Solutions toEnhance the DHS MissionCollectively, these groups have identified gaps in currentpolicy or technologies that inhibit the adoption of securemobile solutions. From these issues, CSD has prioritizedseveral that are appropriate targets for Mobile SecurityR&D, including: Mobile device management Device interface management Trust implementation for executables and access Application management and version control Malware and mobile app security vetting Identity management and authentication Data privacy OS fragmentationThe MDS Program has established several initiativesto address the primary gaps identified through itspartnerships with DHS Components and other federalagencies. These efforts identified needs for secure mobilesolutions in four areas: Mobile device management Mobile app management Identity and access management Data management/data protectionThese areas are interrelated; for example, secure solutionsfor both mobile device management and mobile appmanagement include data protection and integration withidentity and access control solutions.The MDS projects and initiatives addressing thesechallenges are related as illustrated above. These initiativesare broadly focused on mobile device security and mobileapplication security, as described below.Mobile Device SecurityOne objective of this effort is to develop tamper-evidentmodules, or “roots of trust,” that can be continuouslymeasured and verified to produce a chain of cryptographicallystrong evidence about the state of the device. This servesto verify devices are in a protected state at power-on andcontinue to bootstrap trust to verify software (e.g., operatingsystem, apps, security management software, etc.) beforeand during execution. This root of trust can be queried andmeasured to attest to the state of the device to providegreater assurance to security mechanisms such as softwareverification, application and data isolation, and dataprotection, which are at the heart of security enforcementtechnologies such as mobile device management.A cross-cutting effort under mobile device managementseeks to leverage the mobile device’s innate capabilities(e.g., application sandboxing, camera, GPS, etc.) to senseand measure the environment, user interaction, and appinteraction to gather contextual information. Situationalawareness capabilities that relate contextual attributes,such as application usage, patterns of data access, andgeo-location, can be used to ascertain the risk associatedwith the user, device, app, and network connectivity. Thisknowledge can be applied to any of the four categories ofsecurity management for devices, applications, users, anddata to enable the ability to dynamically enforce policies andadapt service access based on threat level associated withthe current context. Moreover, these continuous sources ofcontextual attributes also enable capabilities for behavioralbased user identification and anomaly detection.Mobile App SecurityThe MDS Program is developing a framework that employsstatic, behavioral, and flow-based techniques to continuouslyvet the security posture of government-developed andcommercially developed mobile apps throughout their7S&T CYBER SECURITY DIVISION MOBILE SECURITY R&D PROGRAM GUIDE

lifecycle – from requirements, design, and implementationthrough deployment, maintenance, and retirement. Thiscapability will go beyond identifying malicious software andbe able to pinpoint undesirable behavior that violates userdefined risk criteria. By providing a standard evaluation scoreand analysis report that provides actionable informationfor decision makers to remediate problems, this effort alsopromotes information sharing across Components andfederal agencies, potentially reducing cost and avoidingduplication of analysis efforts.The DHS Joint Requirements Council (JRC), a component-ledbody focused on operational mission areas, is designed toidentify, prioritize and recommend investments to addresscross-department required capabilities, ensuring unity ofeffort among the components, and to address the highestpriority needs to meet mission requirements. The JRCestablished the Cybersecurity Portfolio Team in 2014 toidentify and develop requirements for the highest priority,cross-department capability needs for cybersecurity. TheCybersecurity Portfolio Team identified new capabilities inMobile App Security as a high-priority, cross-departmentneed. Future efforts under the mobile app security programseek to promote a standards-based approach (e.g., vialinkage to national vulnerability databases), integrate thevetting of mobile applications with federal application stores,and enable active management of applications throughoutthe lifecycle by integrating the solution with mobile enterprisemanagement solutions.On the HorizonOBJECTIVE 3. Partner with Industry toFoster InnovationIn addition to addressing current and emerging mobilesecurity challenges in the four key aspects of the MDSProgram (devices, apps, identity, data), additional R&D willbe needed to integrate these technologies into a holisticmobile security solution that protects the HSE. Future R&Dareas include integration into continuous monitoring andother elements of the network security infrastructure.Industry partnerships and relationships enable the MDSprogram to engage and leverage the power of the privatesector to bring innovative solutions to the marketplacesooner. The MDS Program has formed valued relationshipswith academic and industry performers, including thefollowing, by technical area:Mobile Roots of Trust R&D BlueRISC, Inc., Amherst, MA Def-Logix, San Antonio, TX Galois, Inc., Portland, ORMobile Malware Analysis / Mobile App Archiving R&D University of California, Santa Barbara /Vrije Universiteit Amsterdam George Mason University / KryptoWire LLCBroad Agency Announcement: Mobile Technology Security4 Northrop Grumman – Mobile Device Instrumentation HRL Laboratories, LLC – Continuous Behavior BasedAuthentication for Mobile Devices Kryptowire LLC – Quo Vadis? A framework for MobileDevice and User Authentication United Technologies Research Center – CASTRA: ContextAware Security Technology for Responsive and AdaptiveProtection Rutgers University – Dynamic Data Protection via VirtualMicro Security Perimeters IBM: Multi-modal Mobile Security Management for UserBehavior Anomaly Detection and Risk Estimation University of North Carolina at Charlotte – Theseus: AMobile Security Management Tool for Mitigating Attacksin Mobile Networks Intelligent Automation, Inc. – TRUMP: Trusted Monitor andProtection for Mobile DevicesA summary of each performer’s R&D technology follows.References[1]2014 Lookout Mobile Threat Report, Lookout.comWebsite.[2]Department of Homeland Security Information TechnologyStrategic Plan, FY2015-2018.[3]OMB m-16-04, Cybersecurity Strategy and ImplementationPlan, White House Website.[4]See press release at: Department of Homeland SecurityScience & Technology News WebsiteS&T CYBER SECURITY DIVISION MOBILE SECURITY R&D PROGRAM GUIDE8

Software Based MobileRoots of Trust

Mobile Roots of Trust:Software-only Roots of Trustfor Mobile DevicesKristopher Carver – PIEmail Kristopher CarverDr. Andras Moritz – FounderEmail Dr. Andras MoritzBlueRISCJeffry Gummeson – Sr. Security ArchitectEmail Jeffry GummesonOverviewOur ApproachBlueRISC’s MobileRoT measures and verifies a mobiledevice’s static and runtime state to enable trust andoverall device security. It can be utilized to detect malicioussystem change or activity and to ensure that access tocritical information and software can only be performed ina trusted state. MobileRoT requires no modifications to theunderlying operating system kernel, nor any manufactureror service provider support for insertion, which greatlyreduces hurdles to adoption.To overcome the array of surface attacks designedagainst software-based systems, MobileRoT utilizesa new architecture for enabling transitive trust basedon a Core Root of Trust for Measurement (CRTM). TheCRTM is hardened code that acts as the root-of-trust forreliable integrity measurements and is the foundation foradditional trusted services. The MobileRoT architectureincludes a layer of encrypted CRTM code that is tied toa cryptographic key that is generated at boot-time. Withthe CRTM established, the resulting system does notrequire any sensitive information to be stored persistentlyin an unprotected state, closely mimicking the level ofsecurity achievable via a dedicated hardware. A securecryptographic sealing and unsealing procedure tied to theboot-time and runtime measurements performed by thesolution enables application and data protection. Since allprotected data and applications are sealed, they remainprotected even in the case of an attacker’s attempt to alteror bypass the MobileRoT technology.Customer NeedThe mobile device market has grown tremendously.Individuals, businesses, and governments rely on mobiledevices to access critical infrastructure and share vitalinformation (e.g. banking, medical, intellectual property,etc.). This growth in adoption has also brought abouta parallel surge in attacks. Malware, ransomware andspyware are targeting mobile platforms to steal sensitivedata, access private networks, track users and do othernefarious activities. Particularly for governments usingmobile technology, mobile attacks can disrupt life-savingoperations, endanger personnel and expose governmentsystems to exploitation.Roots-of-Trust (RoTs), which are highly trustworthytamper-evident components, can provide a foundation tobuild security and trust. RoTs are usually provided as aspecialized hardware chip (e.g., Trusted Platform Module)on desktop or laptop systems. However, mobile deviceslack dedicated hardware mechanisms for providing RoTs.This leaves a single solution, namely to provide RoTs viasoftware. Unfortunately, this is challenging to realize giventhe sophistication of current threats and the ease in whicha mobile device’s state and information can be extractedand altered. Moreover security specifications such asTrusted Computing Group’s Mobile Trusted Module do notaddress how to support mobile RoTs in software nor dothey address dynamic verification of device and softwarebehavior while applications are running.11Traditional solutions focus primarily on boot-time validation,establishing the validity of each component prior to acomplete boot, while providing only minimal support forruntime activities. Unfortunately, it is widely known thatsophisticated attacks can target applications that arealready running and devices are rarely rebooted these days.To address the shortcomings of one-time static verification,MobileRoT provides dynamic verification and attestation byalso performing runtime measurements of the system stateof the device. These runtime agents harden themselvesfrom attack and modification by creating a self-validatingnetwork, which can instantly respond to a threat to thesystem or the protection technology itself.While cybercrime targeting mobile devices is becomingpervasive, MobileRoT can preserve and confirm theintegrity of the device while at rest or in use. BlueRISC’sMobileRoT technology has overcome barriers to bringRoT to a mobile platform, providing a foundation of securityfeatures to accelerate development ofsecure mobile devices.S&T CYBER SECURITY DIVISION MOBILE SECURITY R&D PROGRAM GUIDE

BenefitsCompetitive AdvantageThe value proposition for BlueRISC’s MobileRoT product isthe establishment of software-based static and dynamicRoTs that can be leveraged for providing application anddata protection and trusted MDM policy enforcement. Theautomated installation methodology and the lack of anymodifications to the underlying operating system kerneldrastically reduce barrier-to-entry.In the mobile device protection, there are two main typesof solutions: those provided by the device manufacturersand those designed to operate on top of the OS to providesome user-land security services. Out of these two types ofproducts, the former represent the main competition. Table1 provides a more detailed competitive analysis betweenmobile protection solutions.MobileRoT reliably allows all levels of software, includinguser applications, to have access to its trusted servicesthrough an open application programming interface (API).This enables the creation of secure off-the-shelf third--partyand proprietary applications and data, and strengthenskey management and policy enforcement technology, suchas Mobile Device Management (MDM). MobileRoT alsoprovides fine-grained protections integrated directly into anapplication. For example, BlueRISC has taken a standardAndroid Calendar application and modified to support theconcept of a “Secure Event”. This secure event is establishedin cooperation with the MobileRoT and persistentlyprotected. To view a secure event, proper authorization andauthentication is required and the system state mustbe verified.BlueRISC’s solution complements the user-land securitysolutions (such as MDM), which could take advantage of theRoTs provided by MobileRoT to harden their system/approachvia the open trusted services API. The provided featuresare valuable to traditional anti-virus/MDM companiesbecause recent trends in security suggest that they arelosing their value proposition as the attacks are becomingmore sophisticated. Lastly, one of the goals of MobileRoTis to provide a U.S.-made alternative to vendor-specifictechnologies such as Samsung’s Knox that is also opento third-party developers. This is also expanding upon theprotections and trusted services while enabling flexibility.Next StepsWe are currently finalizing implementation of the TrustedServices API to provide beta versions to our existingpartners for use-case development and security evaluation.We are always interested in exploring additional use-caseswith new partners.Competitive Analysis of Mobile Protection SolutionsBlueRISCSamsungArxanMcAfeeSoftware-only Roots of TrustFeatures1011Chain-of-trust: Boot through Runtime1100Dynamic System Attestation1011MTM Compatible 1000Open API1110Automated Technology Insertion1001Provisioning for FIPS Certification1100Supports Government Credentials1100Owned & Operated in USA*1011Total:9444 Enables 3rd party MTM compatible software to run* Critical for US Government & Defense Use CasesS&T CYBER SECURITY DIVISION MOBILE SECURITY R&D PROGRAM GUIDE12

Mobile Roots of Trust :Next-Generation Securityand ConfidenceGaloisAdam WickEmail Adam WickOverviewMobile roots of trust provide a mechanism to not only havea secure device, but to prove it. While such capabilities existin limited product lines, we focus on increasing commercialunderstanding of the capability to bootstrap a market thatprovides better and more prevalent capabilities.Customer NeedAs malware infects the mobile environment, the criticalservices in our lives must begin to ensure that the requeststhey receive from our mobile phones are actually comingfrom us, rather than from malware. To do this, they musthave a trustworthy mechanism by which to query the stateof our devices. This capability allows government andcommercial entities to ensure, for example, that criticaldata is only transferred to devices that have been properlyconfigured to organizational standards.At the heart of any such mechanism is a root of trust. Itprovides the basis for any argument the phone makes aboutits state. Because of the root of trust, we trust the phone’sm

(S&T) Mobile Security Research and Development (R&D) Program. This guide introduces you to the goals and objectives for Mobile Security R&D, its alignment with DHS and federal mobile security strategies and priorities, and provides a view into S&T's exploration of new and cutting edge mobile security R&D. We are excited to share these .