作者: Peter Teufl , Thomas Zefferer , Christof Stromberger , Christoph Hechenblaikner
DOI:
关键词:
摘要: The high usability of smartphones and tablets is embraced by consumers as well the private public sector. However, especially in non-consumer area factor security plays a decisive role for platform selection process. All current companies within mobile device sector added wide range features to initially consumer-oriented devices (Apple, Google, Microsoft), or have dealt with core feature from beginning (RIM, now Blackerry). One key protecting data on backups are encryption systems, which deployed most devices. even under assumption that systems implemented correctly, there parameters, specific use cases, weaknesses need be considered officer. As first part series papers, this work analyzes deployment iOS its security-critical context officer's perspective. Thereby, different sub-systems, influence developer, applied configuration, susceptibility various attacks analyzed detail. Based these results we present workflow supports officer analyzing an installed applications context. This supported tools were either developed ourselves available other sources.