JOURNAL ARTICLE

Tamper-resistant database logging on mobile devices

Abstract

Modern mobile devices are able to run a wide range of thirdparty/service provider applications that provide users with a variety of attractive services. These applications have their own databases on the mobile device; user data pertaining to the application are stored there. The popularity comes with a price: attackers are interested in exploiting the weaknesses of the mobile systems to manipulate personal information of users via malicious code or malware. Another problem is that mobile devices are often stolen or misplaced and stored data, which users value more than the hardware, compromised. We propose a consolidated logging scheme that reflects all transactions performed on all databases of mobile applications. Only a part of this logis stored on the mobile device, thus addressing the conflict between space limitation in these devices and the space requirement of logging; yet, it is tamper-resistant and enables restoration of data through logging. We formalize our claims and explain how our scheme addresses some important problems created by malware and theft.

Keywords:
Computer science Mobile device Malware Computer security Variety (cybernetics) Popularity Mobile computing Tamper resistance Logging World Wide Web Computer network

Metrics

1
Cited By
0.75
FWCI (Field Weighted Citation Impact)
5
Refs
0.83
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Digital and Cyber Forensics
Physical Sciences →  Computer Science →  Information Systems
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

BOOK-CHAPTER

A Blockchain-Based Tamper-Resistant Logging Framework

Thomas H. AustinFabio Di Troia

Communications in computer and information science Year: 2022 Pages: 90-104
BOOK-CHAPTER

Probing Attacks On Tamper-Resistant Devices

Helena HandschuhPascal PaillierJacques Stern

Lecture notes in computer science Year: 1999 Pages: 303-315
BOOK-CHAPTER

Low cost attacks on tamper resistant devices

Ross AndersonMarkus Kühn

Lecture notes in computer science Year: 1998 Pages: 125-136
© 2026 ScienceGate Book Chapters — All rights reserved.