INDEX

Mobile Device Security Hardware

The report looks at the security of mobile devices from a hardware perspective. Trust hardware, secure boot, trusted execution environments are analyzed in terms of specifications, applicable standards, and target industries (such as financial services and government applications). The report looks at the current vendors competing to bring security to the core of mobile devices, whether through licensed silicon IP architecture design or firmware standards.

Table of Contents

  • 1. TRUST HARDWARE AND SECURE BOOT
    • 1.1. Driving Trends
    • 1.2. Financial Security for Mobile Payments
    • 1.3. Defense Sector Requires Impenetrable Mobiles
    • 1.4. Root of Trust and Secure Booting
  • 2. CONVERGING SILICON BATTLE
    • 2.1. Trusted Computing Group and Trusted Platform Module
    • 2.2. TPM Mobile
    • 2.3. GlobalPlatform Alliance and Trusted Execution Environment
    • 2.4. ARM TrustZone
    • 2.5. Trustonic
    • 2.6. TPM Mobile and TEE
    • 2.7. TEE versus TPM
    • 2.8. TPM and UEFI Secure Boot
    • 2.9. Microsoft Pushes UEFI to Windows 8
    • 2.10. UEFI versus TrustZone
    • 2.11. McAfee DeepSAFE
    • 2.12. Converging Landscape for Secure Mobile Hardware
  • 3. THE SCRAMBLE FOR TRUST
    • 3.1. Nokia and Windows 8
    • 3.2. Apple and iOS 7
    • 3.3. Samsung and Android 4
    • 3.4. Vendorscape

Tables

  1. Mobile Security Market Revenues, World Market, Forecast: 2013-2018
  2. Mobile Device Security Revenues, World Market, Forecast: 2013-2018
  3. Microsoft Windows 8 Phone Security Features
  4. Apple iOS Security Features

Charts

  1. Mobile Security Market Revenues, World Market, Forecast: 2013-2018
  2. Mobile Device Security Revenues, World Market, Forecast: 2013-2018

Figures

  1. Trustonic Joint-venture Partners
  2. GlobalPlatform and Trusted Computing Group, TEE and TPM
  3. Mobile Device Security Vendor Landscape