Secure System (for seL4) Application icon

Secure System (for seL4) 1.5

4.7 MB / 1+ Downloads / Rating 5.0 - 1 reviews


See previous versions

Secure System (for seL4), developed and published by Florida Software (James B. Morris), has released its latest version, 1.5, on 2017-08-09. This app falls under the Business category on the Google Play Store and has achieved over 100 installs. It currently holds an overall rating of 5.0, based on 1 reviews.

Secure System (for seL4) APK available on this page is compatible with all Android devices that meet the required specifications (Android 5.0+). It can also be installed on PC and Mac using an Android emulator such as Bluestacks, LDPlayer, and others.

Read More

App Screenshot

App Screenshot

App Details

Package name: com.fullsecurity.shared

Updated: 8 years ago

Developer Name: Florida Software (James B. Morris)

Category: Business

App Permissions: Show more

Installation Instructions

This article outlines two straightforward methods for installing Secure System (for seL4) on PC Windows and Mac.

Using BlueStacks

  1. Download the APK/XAPK file from this page.
  2. Install BlueStacks by visiting http://bluestacks.com.
  3. Open the APK/XAPK file by double-clicking it. This action will launch BlueStacks and begin the application's installation. If the APK file does not automatically open with BlueStacks, right-click on it and select 'Open with...', then navigate to BlueStacks. Alternatively, you can drag-and-drop the APK file onto the BlueStacks home screen.
  4. Wait a few seconds for the installation to complete. Once done, the installed app will appear on the BlueStacks home screen. Click its icon to start using the application.

Using LDPlayer

  1. Download and install LDPlayer from https://www.ldplayer.net.
  2. Drag the APK/XAPK file directly into LDPlayer.

If you have any questions, please don't hesitate to contact us.

Previous Versions

Secure System (for seL4) 1.5
2017-08-09 / 4.7 MB / Android 5.0+

About this app

Successful attacks against computer systems worldwide by external hackers and malicious insiders are growing. The secure system prototype in this app demonstrates a trusted computing base (TCB) concept building on the formally-verified seL4 microkernel that will be highly effective against deterring these growing threats.

The system demonstrated in this project will be "unhackable.” An “unhackable” system has the following properties: (1) the risk (and expense) of an external hacker's theft or damage of sensitive data will be far greater than the reward and (2) the probability of theft by a malicious insider will be reduced to very near zero.

The threats posed by external hackers were proved to be preventable in the recently completed DARPA HACMS project, as described in several recent articles. The HACMS project has shown that technology required to prevent data loss and damage by external hackers can be prevented using technology (seL4) that is mostly available today. This app is intended to give a simple demonstration of how to construct a secure system prototype using the seL4 microkernel as a hypervisor for multiple Java Virtual Machines (JVMs).

Read more about the technical details of the system proposed here in the three articles below that were recently published on ACM's Ubiquity website at http://ubiquity.acm.org.

Insider Attacks are a Bigger and Harder Threat?
http://ubiquity.acm.org/blog/insider-attacks-bigger-harder-threat/

Cybersecurity skeptics now embracing formal methods: an interview with Gernot Heiser and Jim Morris
http://ubiquity.acm.org/article.cfm?id=3081880

10 Rules for an Unhackable Data Vault
http://ubiquity.acm.org/article.cfm?id=3081882

The prototype demonstrated here obviously runs on Android, not on seL4. However, as the secure system diagram at the top of the Play Store page clearly shows, the prototype is intended to eventually run ONLY on an underlying seL4 operating system (NOT Windows, NOT Android, and NOT *nix). Once a JVM has been ported to seL4, this prototype will form the initial middleware for a secure system using seL4 as a TCB.

This demonstration hypothesizes four secure clients communicating with a secure server. All communication between client and server is encrypted using Station-to-Station (STS) protocol. A successful STS exchange generates a 256-bit AES encryption key. After the key is used in the next three communication sessions, a new key must be generated using STS. The key expires in the demo if a client is idle for 10 or more seconds. Authentication between client and server is performed using a password stored on all four clients and the server. No systems other than those with the proper stored password can communicate with any node in the proposed system.

After a JVM is successfully ported to seL4, the clients and the server will all be immune to hacking by external hackers and malicious insiders. In such a system it will not be possible for a stored password (or any other data) to be stolen by either insiders or outsiders.

Three simple operations are available to clients in this prototype: (1) encryption loop test, (2) show directory, and (3) retrieve file. The retrieved file is a PDF file of about 1.5 megabytes. After a file is received, the number in parentheses shows the decryption time on your Android device. My smartphone is a Samsung Note 5. The decryption time on my Note 5 is about 80-120 milliseconds, demonstrating that encryption and decryption will be a very small percentage of the overall transmission time.

To run the app in automatic mode (let the system do all the work while you watch the action), type "0.0.0.0" into the field that asks for an IP address, then click "Accept IP Address." This simulates the clicking of buttons in the four clients.

To run the app by clicking the buttons yourself, type "localhost" into the IP address field, then click "Accept IP Address." You can click any enabled button in any of the four clients.

App Permissions

Allows applications to open network sockets.
Allows applications to access information about networks.
Allows an application to write to external storage.
Allows an application to read from external storage.