loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Peter Teufl ; Thomas Zefferer ; Christof Stromberger and Christoph Hechenblaikner

Affiliation: Graz University of Technology, Austria

Keyword(s): Smartphone Security, iOS, Encryption, Bring-Your-Own-Device, Mobile Device Management, Mobile Devices, Risk Analysis, Security Analysis.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Data Protection ; Databases and Data Security ; Information and Systems Security ; Information Assurance ; Management of Computing Security ; Risk Assessment ; Security and Privacy in Mobile Systems

Abstract: The high usability of smartphones and tablets is embraced by consumers as well as the private and public sector. However, especially in the non-consumer area the factor security plays a decisive role for the platform selection process. All of the current companies within the mobile device sector added a wide range of security features to the initially consumer-oriented devices (Apple, Google, Microsoft), or have dealt with security as a core feature from the beginning (RIM, now Blackerry). One of the key security features for protecting data on the device or in device backups are the encryption systems, which are deployed in most current devices. However, even under the assumption that the systems are implemented correctly, there is a wide range of parameters, specific use cases, and weaknesses that need to be considered by the security officer. As the first part in a series of papers, this work analyzes the deployment of the iOS platform and its encryption systems within a security- critical context from a security officer’s perspective. Thereby, the different sub-systems, the influence of the developer, the applied configuration, and the susceptibility to various attacks are analyzed in detail. Based on these results we present a workflow that supports the security officer in analyzing the security of an iOS device and the installed applications within a security-critical context. This workflow is supported by various tools that were either developed by ourselves or are available from other sources. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.226.169.94

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Teufl, P.; Zefferer, T.; Stromberger, C. and Hechenblaikner, C. (2013). iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments. In Proceedings of the 10th International Conference on Security and Cryptography (ICETE 2013) - SECRYPT; ISBN 978-989-8565-73-0; ISSN 2184-3236, SciTePress, pages 170-182. DOI: 10.5220/0004526201700182

@conference{secrypt13,
author={Peter Teufl. and Thomas Zefferer. and Christof Stromberger. and Christoph Hechenblaikner.},
title={iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography (ICETE 2013) - SECRYPT},
year={2013},
pages={170-182},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004526201700182},
isbn={978-989-8565-73-0},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 10th International Conference on Security and Cryptography (ICETE 2013) - SECRYPT
TI - iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments
SN - 978-989-8565-73-0
IS - 2184-3236
AU - Teufl, P.
AU - Zefferer, T.
AU - Stromberger, C.
AU - Hechenblaikner, C.
PY - 2013
SP - 170
EP - 182
DO - 10.5220/0004526201700182
PB - SciTePress