SlideShare a Scribd company logo
The Evolution of
Mobile Security
Fifteen years of learning from mobile mistakes
The first
smartphones
start to appear
Palm added email, basic
web access and a phone to
a personal organizerwith
the Treo 650. There was
almost no security.
2004
2006
Nokia’s N95 made
camera, music and
GPS a priority.
Name: Software 2.0
Publisher: ABD Software Inc.
From: http//: ABDsoftware2.com
CERTIFICATE
Symbian and
Nokia take viruses
seriously
Symbian 9 required most
apps to be signed to
protect against viruses.
2007
Early iPhones used ASLR, code signing,
sandboxing and hardware encryption,
setting new expectations forphones.
Hash
Function
Code Hashed Code Signed Code
SignatureEncrypt Hash Using
a Private Key
Attached
to Code
Encrypted Hash &
Time Stamp
Apple reinvents the phone with
open software, closed hardware
Read on formore Mobile Security historical facts
Protect Your Enterprise With
Samsung Knox Security
Discoverwhy Samsung phones are the most secure
and manageable mobile devices available.
2008
Policies
Manage
Devices
InfoSec and
ITManagers
Exchange Server
With ActiveSync
Microsoft Exchange
ActiveSync (EAS)
builds in MDM
Microsoft built basic MDM
feature into EAS, bolstering
admin security. BlackBerry
broadened MDM beyond
Exchange in 2009.
Mobile Devices
2010
Android v2.2 makes
EAS management easy
with built-in support
Security policy controls like remote
wipe became part of mainstream
Android, shifting it toward
enterprise environments.
REMOTE
WIPE
2012
Samsung Knox identifies
key enterprise security
requirements
Samsung began investing in
securityto make Android
enterprise-safe, pushing
features like SE Linux into
the mainstream.
2013
TrustZone, a secure
mode supported by
ARM processors,
protects information
against compromise.
Normal
Apps
Nonsecure World
Client TEE API
Rich OS
Trusted
Apps
Secure World
Secure TEE API
Trusted OS
Monitor
ARM Security Extensions
TrustZone protects
encryption keys and
identity information
2014 2017
READ
ONLY
RKP
SECURE WORLD NORMALWORLD
KERNEL
Control instructions and page table
update functions are replaced by
traps to the Secure World
Page tables are mapped
read-only so they cannot be
directly modified by the kernel
Galaxy Note4
(2014)
Galaxy Note Edge
(2014)
Galaxy Note5
(2015)
Galaxy S7
(2016)
Galaxy Note8
(2017)
Galaxy S8
(2017)
Samsung
Knox innovations
continue to add
security to Android
Knox brought critical features to
Android, like biometrics, real-time
kernel protection and separate
work/home profiles.
2018
Samsung Knox continues
to blaze the trail in mobile
security, as olderfeatures
are reimagined by Google
forAndroid.
Knox 3.0 joins Google’s
Android Enterprise with
Samsung security
©2019 Samsung Electronics America, Inc. Samsung is a registered mark of Samsung Electronics Corp., Ltd. All brand, product,
service names and logos are trademarks and/or registered trademarks of their respective manufacturers and companies.
Samsung Knox security empowers
enterprises to go mobile-first confidently.

More Related Content

The Evolution of Mobile Security

  • 1. The Evolution of Mobile Security Fifteen years of learning from mobile mistakes
  • 2. The first smartphones start to appear Palm added email, basic web access and a phone to a personal organizerwith the Treo 650. There was almost no security. 2004
  • 3. 2006 Nokia’s N95 made camera, music and GPS a priority. Name: Software 2.0 Publisher: ABD Software Inc. From: http//: ABDsoftware2.com CERTIFICATE Symbian and Nokia take viruses seriously Symbian 9 required most apps to be signed to protect against viruses.
  • 4. 2007 Early iPhones used ASLR, code signing, sandboxing and hardware encryption, setting new expectations forphones. Hash Function Code Hashed Code Signed Code SignatureEncrypt Hash Using a Private Key Attached to Code Encrypted Hash & Time Stamp Apple reinvents the phone with open software, closed hardware
  • 5. Read on formore Mobile Security historical facts Protect Your Enterprise With Samsung Knox Security Discoverwhy Samsung phones are the most secure and manageable mobile devices available.
  • 6. 2008 Policies Manage Devices InfoSec and ITManagers Exchange Server With ActiveSync Microsoft Exchange ActiveSync (EAS) builds in MDM Microsoft built basic MDM feature into EAS, bolstering admin security. BlackBerry broadened MDM beyond Exchange in 2009. Mobile Devices
  • 7. 2010 Android v2.2 makes EAS management easy with built-in support Security policy controls like remote wipe became part of mainstream Android, shifting it toward enterprise environments. REMOTE WIPE
  • 8. 2012 Samsung Knox identifies key enterprise security requirements Samsung began investing in securityto make Android enterprise-safe, pushing features like SE Linux into the mainstream.
  • 9. 2013 TrustZone, a secure mode supported by ARM processors, protects information against compromise. Normal Apps Nonsecure World Client TEE API Rich OS Trusted Apps Secure World Secure TEE API Trusted OS Monitor ARM Security Extensions TrustZone protects encryption keys and identity information
  • 10. 2014 2017 READ ONLY RKP SECURE WORLD NORMALWORLD KERNEL Control instructions and page table update functions are replaced by traps to the Secure World Page tables are mapped read-only so they cannot be directly modified by the kernel Galaxy Note4 (2014) Galaxy Note Edge (2014) Galaxy Note5 (2015) Galaxy S7 (2016) Galaxy Note8 (2017) Galaxy S8 (2017) Samsung Knox innovations continue to add security to Android Knox brought critical features to Android, like biometrics, real-time kernel protection and separate work/home profiles.
  • 11. 2018 Samsung Knox continues to blaze the trail in mobile security, as olderfeatures are reimagined by Google forAndroid. Knox 3.0 joins Google’s Android Enterprise with Samsung security
  • 12. ©2019 Samsung Electronics America, Inc. Samsung is a registered mark of Samsung Electronics Corp., Ltd. All brand, product, service names and logos are trademarks and/or registered trademarks of their respective manufacturers and companies. Samsung Knox security empowers enterprises to go mobile-first confidently.