iOS encryption systems: Deploying iOS devices in security-critical environments

作者: Peter Teufl , Thomas Zefferer , Christof Stromberger , Christoph Hechenblaikner

DOI:

关键词:

摘要: The high usability of smartphones and tablets is embraced by consumers as well the private public sector. However, especially in non-consumer area factor security plays a decisive role for platform selection process. All current companies within mobile device sector added wide range features to initially consumer-oriented devices (Apple, Google, Microsoft), or have dealt with core feature from beginning (RIM, now Blackerry). One key protecting data on backups are encryption systems, which deployed most devices. even under assumption that systems implemented correctly, there parameters, specific use cases, weaknesses need be considered officer. As first part series papers, this work analyzes deployment iOS its security-critical context officer's perspective. Thereby, different sub-systems, influence developer, applied configuration, susceptibility various attacks analyzed detail. Based these results we present workflow supports officer analyzing an installed applications context. This supported tools were either developed ourselves available other sources.

参考文章(6)
B. Kaliski, PKCS #5: Password-Based Cryptography Specification Version 2.0 RFC. ,vol. 2898, pp. 1- 34 ,(2000)
Liang Shurui, Liu Jie, Zhang Ru, Wang Cong, A Modified AES Algorithm for the Platform of Smartphone computational aspects of social networks. pp. 749- 752 ,(2010) , 10.1109/CASON.2010.172
Vaibhav Ranchhoddas Pandya, Mark Stamp, iPhone Security Analysis Journal of Information Security. ,vol. 1, pp. 74- 87 ,(2010) , 10.4236/JIS.2010.12009
Mithun Paul, Nitin Singh Chauhan, Ashutosh Saxena, A security analysis of smartphone data flow and feasible solutions for lawful interception information assurance and security. pp. 19- 24 ,(2011) , 10.1109/ISIAS.2011.6122788
Yu Chen, Wei-Shinn Ku, Self-Encryption Scheme for Data Security in Mobile Devices 2009 6th IEEE Consumer Communications and Networking Conference. pp. 850- 854 ,(2009) , 10.1109/CCNC.2009.4784733