iPhone Security Analysis

HTML  Download Download as PDF (Size: 799KB)  PP. 74-87  
DOI: 10.4236/jis.2010.12009    7,039 Downloads   15,568 Views  Citations

Affiliation(s)

.

ABSTRACT

The release of Apple’s iPhone was one of the most intensively publicized product releases in the history of mobile devices. While the iPhone wowed users with its exciting design and features, it also angered many for not allowing installation of third party applications and for working exclusively with AT & T wireless services (in the US). Besides the US, iPhone was only sold only in a few other selected countries. Software attacks were developed to overcome both limitations. The development of those attacks and further evaluation revealed several vulnerabilities in iPhone security. In this paper, we examine some of the attacks developed for the iPhone as a way of investigating the iPhone’s security structure. We also analyze the security holes that have been discovered and make suggestions for improving iPhone security.

Share and Cite:

V. Pandya and M. Stamp, "iPhone Security Analysis," Journal of Information Security, Vol. 1 No. 2, 2010, pp. 74-87. doi: 10.4236/jis.2010.12009.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.