Forensic-Ready Secure iOS Apps for Jailbroken iPhones
نویسندگان
چکیده
Apple’s iOS is one of the major players in the smartphone market and it restricts installation of apps which are not from Apple app store. Users often resort to jailbreak their iPhones to break free from these restrictions. Considering jailbreaking iPhones is legal in the US; more devices are expected to be jailbroken in future. Jailbroken iPhones are making their way into enterprises, which allow Bring Your Own Device (BYOD), but these devices are either barred or restricted by Mobile Device Management (MDM) softwares which consider them as a security risk. In this work, we have designed a solution (iSecureRing) to secure mobile apps and to preserve date and time stamps of events to handle any security incidents in the jailbroken iPhones. To the best of our knowledge, iSecureRing is the first forensic ready mobile app security solution to secure an application running in an unsecure environment within the enterprise environment.
منابع مشابه
Distributed Tuning of Boundary Resources: The Case of Apple's iOS Service System
Code Blog Reference 1a MacManus, R. (2007). 'Steve Jobs: iPhone Ain't Opening Up ', Read/WriteWeb, 12 January 2007, Gruber, J. (2007). 'iPhone SDK, iPhone SDK! Wherefore Art Thou iPhone SDK?', Daring Fireball, 03 June 2007, 1b Apple (2007). 'iPhone to Sup...
متن کاملSecuring a Mobile World
4 CrossTalk—March/April 2012 Abstract. The sphere of malware attacks is expanding to engulf the compact world of smartphones. This paper sheds light on exploitation tactics used by malware writers in designing iPhone applications that exploit the integrity of the victim’s phone. Our interest is in the harder problem of malware on iPhones that are not jailbroken. Introduction Malware has begun i...
متن کاملMAD-IOS: Dynamic App Vulnerability Analysis in Non-jailbroken Devices
Mobile apps are pervasive in our life supporting us from simple actions, such as photo sharing, to more important ones, such as banking transactions. Security around these operations and data is crucial, making app vulnerability analysis and code review fundamental. Android and iOS split the mobile market share each other. However, while the first can rely on many analysis tools, for iOS it is ...
متن کاملSmartphones, Smart Seniors, But Not-So-Smart Apps: A Heuristic Evaluation of Fitness Apps
This paper reports on the results of a heuristic evaluation of Nike+ and RunKeeper, two of the most popular health and fitness mobile apps found in both Google Play and the iTunes stores for Android and iOS platforms respectively. Given the potential benefit of practicing physical exercise in living a healthier and longer life, this study aimed at understanding whether or not these apps are rea...
متن کاملA Forensically Sound Adversary Model for Mobile Devices
In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and rapidly changing nature of mobile device technologies. An integral principle and significant constraint upon forensic practitioners is that of...
متن کامل