Forensic-Ready Secure iOS Apps for Jailbroken iPhones

نویسندگان

  • Jayaprakash Govindaraj
  • Rashmi Mata
  • Robin Verma
  • Gaurav Gupta
چکیده

Apple’s iOS is one of the major players in the smartphone market and it restricts installation of apps which are not from Apple app store. Users often resort to jailbreak their iPhones to break free from these restrictions. Considering jailbreaking iPhones is legal in the US; more devices are expected to be jailbroken in future. Jailbroken iPhones are making their way into enterprises, which allow Bring Your Own Device (BYOD), but these devices are either barred or restricted by Mobile Device Management (MDM) softwares which consider them as a security risk. In this work, we have designed a solution (iSecureRing) to secure mobile apps and to preserve date and time stamps of events to handle any security incidents in the jailbroken iPhones. To the best of our knowledge, iSecureRing is the first forensic ready mobile app security solution to secure an application running in an unsecure environment within the enterprise environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distributed Tuning of Boundary Resources: The Case of Apple's iOS Service System

Code Blog Reference 1a MacManus, R. (2007). 'Steve Jobs: iPhone Ain't Opening Up ', Read/WriteWeb, 12 January 2007, Gruber, J. (2007). 'iPhone SDK, iPhone SDK! Wherefore Art Thou iPhone SDK?', Daring Fireball, 03 June 2007, 1b Apple (2007). 'iPhone to Sup...

متن کامل

Securing a Mobile World

4 CrossTalk—March/April 2012 Abstract. The sphere of malware attacks is expanding to engulf the compact world of smartphones. This paper sheds light on exploitation tactics used by malware writers in designing iPhone applications that exploit the integrity of the victim’s phone. Our interest is in the harder problem of malware on iPhones that are not jailbroken. Introduction Malware has begun i...

متن کامل

MAD-IOS: Dynamic App Vulnerability Analysis in Non-jailbroken Devices

Mobile apps are pervasive in our life supporting us from simple actions, such as photo sharing, to more important ones, such as banking transactions. Security around these operations and data is crucial, making app vulnerability analysis and code review fundamental. Android and iOS split the mobile market share each other. However, while the first can rely on many analysis tools, for iOS it is ...

متن کامل

Smartphones, Smart Seniors, But Not-So-Smart Apps: A Heuristic Evaluation of Fitness Apps

This paper reports on the results of a heuristic evaluation of Nike+ and RunKeeper, two of the most popular health and fitness mobile apps found in both Google Play and the iTunes stores for Android and iOS platforms respectively. Given the potential benefit of practicing physical exercise in living a healthier and longer life, this study aimed at understanding whether or not these apps are rea...

متن کامل

A Forensically Sound Adversary Model for Mobile Devices

In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and rapidly changing nature of mobile device technologies. An integral principle and significant constraint upon forensic practitioners is that of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015