components is potentially problematic, data exchange
between local and remote software (Local SW ↔ Re-
mote SW) can be protected by means of established
protocols. For instance, Transport Layer Security
(TLS) (Network Working Group, 2008) can be used
to reliably assure the confidentiality and integrity of
data exchanged between local and remote software.
In contrast, the communication path between the Sig-
natory and local software is more problematic. Nei-
ther Android nor iOS provide secure input/output ca-
pabilities. ARM TrustZone is a potential future so-
lution to this problem, but yet not available on most
mobile devices.
Regarding the communication between local soft-
ware and a local QSCD (Local SW ↔ Local QSCD),
a trade-off between feasibility and security can be
identified. Android provides mobile apps the oppor-
tunity to access local hardware elements that imple-
ment QSCD functionality. However, this implies that
also malware residing on the mobile device can do
so. In contrast, iOS is more restrictive. This reduces
the feasibility of ACs relying on local QSCDs on this
platform, but also prevents access by malware. Where
available, secure communication between local soft-
ware and local QSCDs must not be taken for granted.
In case of local software and a remote QSCD (Lo-
cal SW ↔ Remote QSCD), the situation is differ-
ent. As this setup requires cross-domain communi-
cation, additional remote software is needed to extent
the QSCD’s functionality by means of cross-domain
communication capabilities. Again, communication
between this module and local software can be easily
secured with the help of established protocols such as
TLS. The situation is more difficult in case of remote
software and a local QSCD (Remote SW ↔ Local
QSCD). Again, cross-domain communication is re-
quired, which implies the need for an additional mod-
ule to enhance the QSCD with cross-domain commu-
nication capabilities. If this module is implemented
as mobile app, communication between this app and
the local QSCD is required. This corresponds to the
communication-path class Local SW ↔ Local QSCD.
If the local SIM is used as QSCD, the required addi-
tional module can also be implemented as SIM appli-
cation. However, this requires a cooperation of the
mobile network operator, as communication between
remote software and the local SIM needs to rely on
the mobile network.
Focusing on the implementation perspective with
special regard to the two target platforms Android and
iOS shows that security cannot be assured for vari-
ous components and communication-path classes. By
mapping obtained findings to the four ACs, the best
AC, i.e. the one that includes the fewest problem-
atic components, can be identified. For a compara-
tive analysis, it is sufficient to focus on those com-
ponents and communication-path classes, for which
there are differences between the four ACs. Figure
3 shows that this applies to one component and four
communication-path classes.
Concretely, the SPC is the only component that
shows AC-specific differences regarding the three rel-
evant assets. Concretely, the assets SD and DTBS
are prone to attacks on the component SPC for AC
A and AC B only. Hence, AC C and AC D are ad-
vantageous in this regard. Similar conclusions can be
drawn for the communication between local software
components. This is required for the exchange of as-
sets by AC A and AC B only. As IPC is potentially
insecure on the assessed target platforms, AC A and
AC B must be regarded as disadvantageous.
The remaining three communication-path classes,
for which there are differences between the four
ACs, are all related to data exchange between soft-
ware components and the QSCD. Simply counting
the occurrences of assets on these communication-
path classes indicates that AC D is advantageous from
a conceptual perspective. Following this approach,
only the asset AD is transmitted once. For all other
ACs, all three assets are present at least once on one of
the three communication-path classes. The advantage
of AC D is also revealed when taking into account a
concrete implementation on the two target platforms.
As discussed above, secure communication is easier
to achieve for remote QSCDs than for local QSCDs.
Thus, AC B and AC D are advantageous in this re-
gard.
4.3 Findings
From the conducted security assessment of the four
ACs, several findings can be derived. A compari-
son of the four ACs on a pure conceptual level yields
AC D to be advantageous, as this AC shows the low-
est number of components and communication paths,
on which identified assets are potentially prone to at-
tacks. Similar findings are also obtained, when the
implementation perspective and the current state of
the art of mobile platforms is taken into account. Con-
cretely, the conducted assessment has revealed that a
local implementation of the SPC is disadvantageous.
Furthermore, a local implementation of the QSCD has
turned out to be disadvantageous as well. Thus, AC
D is also advantageous from an implementation per-
spective. The other three ACs suffer from the inability
to provide a sufficient level of security on current mo-
bile platforms. Although the concrete threat potential
depends on the functionality being implemented lo-
TowardsTransactionalElectronicServicesonMobileEnd-userDevices-ASustainableArchitectureforMobileSignature
Solutions
593