iOS Keychain Weakness FAQ

نویسندگان

  • Jens Heider
  • Rachid El Khayari
چکیده

This paper summarizes answers to frequently asked questions about the iOS keychain weakness described in [HB11]. It provides further information for security evaluators on the impact of the findings.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lost iPhone? Lost Passwords!

The paper highlights risks that accompany losing a locked iOS device regarding confidentiality of passwords stored in the keychain. It presents results of handson tests that show the possibility for attackers to reveal some of the keychain entries. For the described approach, the knowledge of the user’s secret passcode is not needed, as the protection provided by the passcode is bypassed.

متن کامل

Unauthorized Cross-App Resource Access on MAC OS X and iOS

On modern operating systems, applications under the same user are separated from each other, for the purpose of protecting them against malware and compromised programs. Given the complexity of today’s OSes, less clear is whether such isolation is effective against different kind of cross-app resource access attacks (called XARA in our research). To better understand the problem, on the less-st...

متن کامل

Design and Implementation of the Smart Virtual Machine on iOS Platform for the Mobile Game Portability

Development of computing environments and mobile devices lead to rapid growth of smart device, mobile OS and application market. Especially, the mobile platform sector with major runners of Apple and Google, compose the core technology for mobile applications. iOS and Android represent mobile platforms each supporting individual execution environment, development tools and development methodolo...

متن کامل

Paul , Greig and Irvine , James ( 2016 ) IEDs on the Road to Fingerprint

Almost every 2016 flagship mobile phone, whether Android or iOS-based, is set to come with an integrated fingerprint reader. The convenience benefits of fingerprint readers are clear to users, but is the underlying technology really ready for widespread adoption? This article explores some of the background of the challenge of secure user authentication on mobile devices, as well as recent weak...

متن کامل

Fingerprint Authentication is here, but are we ready for what it brings?

Almost every 2016 flagship mobile phone, whether Android or iOS-based, is set to come with an integrated fingerprint reader. The convenience benefits of fingerprint readers are clear to users, but is the underlying technology really ready for widespread adoption? This article explores some of the background of the challenge of secure user authentication on mobile devices, as well as recent weak...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012