Security Evaluation of Apple’s iPhone
نویسندگان
چکیده
Executive Summary The Apple iPhone was released to much fanfare on June 29, 2007. Because of the large amount of personal information stored on these mobile devices, we decided to conduct a security analysis of the iPhone. The iPhone's applications for surfing the web and checking emails are potentially at risk to remote attacks. We wanted to determine exactly how well the software on the iPhone was designed to resist such attacks. The iPhone runs a stripped down and customized version of Mac OS X on an ARM processor. Much of the device's claimed security is reliant on its restrictions against running third party applications. Only Javascipt code can be executed in the Safari web browser, ensuring that all such code executes in a " sandbox " environment. Many of the features of Safari have also been removed, such as the ability to use plug-ins such as Flash. Likewise, many filetypes cannot be downloaded. These actions serve to reduce the attack surface of the device. However, there are serious problems with the design and implementation of security on the iPhone. The most glaring is that all processes of interest run with administrative privileges. This implies that a compromise of any application gives an attacker full access to the device. Like the desktop versions of Mac OS X on which its operating system is based, the iPhone also does not utilize widely accepted practices, such as using address randomization or non-executable heaps, to make exploitation more difficult. These weaknesses allow for the easy development of stable exploit code once a vulnerability is discovered. To demonstrate these security weaknesses, we created an exploit for the Safari browser on the iPhone. We used an unmodified iPhone to surf to a malicious HTML document that we created. When this page was viewed, the payload of the exploit forced the iPhone to make an outbound connection to a server we controlled. The compromised iPhone then sent personal data including SMS text messages, contact information, call history, and voice mail information over this connection. All of this data was collected automatically and surreptitiously. After examination of the filesystem, it is clear that other personal data such as passwords, emails, and browsing history could be obtained from the device. We only retrieved some of the personal data but could just as easily have retrieved any information off the device. Additionally, we wrote a second exploit that performs …
منابع مشابه
iPhone Security Analysis
The release of Apple’s iPhone was one of the most intensively publicized product releases in the history of mobile devices. While the iPhone wowed users with its exciting design and features, it also angered many for not allowing installation of third party applications and for working exclusively with AT & T wireless services (in the US). Besides the US, iPhone was only sold only in a few othe...
متن کاملiPhone and iPod Location Spoofing: Attacks on Public WLAN-based Positioning Systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system [41], available on PCs and used on a number of mobile platforms, including Apple’s iPod touch and iPhone [1]. We demonstrate that this system is vulnerable to location spoofing and location database manipulation attacks. We further discuss approaches for secu...
متن کاملEvaluating the iPhone as a Mobile Platform for People-Centric Sensing Applications
A number of mobile phones such as the Nokia N95 and Apple iPhone are being used by researchers to explore new people-centric sensing applications. These top-end phones include various sensors (e.g., accelerometer, proximity sensor, GPS, camera, microphone), radios (e.g., Bluetooth, WiFi, cellular), operating systems (e.g., Symbian, customized Mac OS X), and processors (e.g., 330 Mhz ARM, 412 Mh...
متن کاملSecuring a Mobile World
4 CrossTalk—March/April 2012 Abstract. The sphere of malware attacks is expanding to engulf the compact world of smartphones. This paper sheds light on exploitation tactics used by malware writers in designing iPhone applications that exploit the integrity of the victim’s phone. Our interest is in the harder problem of malware on iPhones that are not jailbroken. Introduction Malware has begun i...
متن کاملLaunching Generic Attacks on iOS with Approved Third-Party Applications
iOS is Apple’s mobile operating system, which is used on iPhone, iPad and iPod touch. Any third-party applications developed for iOS devices are required to go through Apple’s application vetting process and appear on the official iTunes App Store upon approval. When an application is downloaded from the store and installed on an iOS device, it is given a limited set of privileges, which are en...
متن کامل