Abstract:
One of the key themes in the security community over the last few years has been how to create a strong root of trust, particularly in the mobile space. After all, a strong root of trust enables a wide variety of capabilities across a number of industries. Some researchers have responded to this call with various solutions across the mobile and traditional computing worlds, while other researchers have shown how we can use these technologies in various protocols and system designs.