Journal of Information Security

Volume 1, Issue 2 (October 2010)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

iPhone Security Analysis

HTML  Download Download as PDF (Size: 799KB)  PP. 74-87  
DOI: 10.4236/jis.2010.12009    7,052 Downloads   15,597 Views  Citations

Affiliation(s)

.

ABSTRACT

The release of Apple’s iPhone was one of the most intensively publicized product releases in the history of mobile devices. While the iPhone wowed users with its exciting design and features, it also angered many for not allowing installation of third party applications and for working exclusively with AT & T wireless services (in the US). Besides the US, iPhone was only sold only in a few other selected countries. Software attacks were developed to overcome both limitations. The development of those attacks and further evaluation revealed several vulnerabilities in iPhone security. In this paper, we examine some of the attacks developed for the iPhone as a way of investigating the iPhone’s security structure. We also analyze the security holes that have been discovered and make suggestions for improving iPhone security.

Share and Cite:

V. Pandya and M. Stamp, "iPhone Security Analysis," Journal of Information Security, Vol. 1 No. 2, 2010, pp. 74-87. doi: 10.4236/jis.2010.12009.

Cited by

[1] Digital Forensics Security Analysis on iOS Devices
2021
[2] SoK: Untangling File-based Encryption on Mobile Devices
arXiv preprint arXiv:2111.12456, 2021
[3] Is Every Application That Are Using In Mobiles Are Secure?
IJSART, 2020
[4] 시나리오 기반의 스마트폰 취약점에 대한 보안방안
2018
[5] Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices
International Journal of E-Services and Mobile Applications (IJESMA), 2018
[6] 시나리오 기반의 스마트폰 취약점에 대한 보안방안 연구
2018
[7] The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation
ICT Systems Security and Privacy Protection, 2015
[8] Crypto-Bootloader–Secure in-field firmware updates for ultra-low power MCUs
2015
[9] A Summer Internship Project Report On Enhancing Database Security in Android Devices Carried out at the Institute for Development and Research in Banking Technology During 12th May-14th July 2014
2014
[10] iOS 系统安全和口令破解研究
安阳师范学院学报, 2014
[11] Android Encryption Systems
2014
[12] An evaluation of smartphone communication (in) security
Thesis, 2014
[13] iOS 系统数据安全分析与加固
通信技术, 2014
[14] Smartphone privacy perceptions and behaviors generational influence quantitative analysis: Communications privacy management theory
ProQuest Dissertations Publishing, 2014
[15] Anomaly-based intrusion detection and prevention systems for mobile devices: Design and development
2013
[16] iOS encryption systems: Deploying iOS devices in security-critical environments
Security and Cryptography (SECRYPT), 2013 International Conference on, 2013
[17] Mobile Device Encryption Systems
Security and Privacy Protection in Information Processing Systems, 2013
[18] iOS Encryption Systems
2013
[19] SIPmsign: a lightweight mobile signature service based on the Session Initiation Protocol
Software: Practice and Experience, 2012
[20] PROPUESTA PARA TRABAJO DE GRADO
2012
[21] iOS 系统数据安全研究
信息安全与通信保密, 2012
[22] Exploration of attacks on current generation smartphones
Procedia Computer Science, 2011
[23] Τεχνικ? Σ?γκριση Λειτουργικ?ν Συστημ?των Apple iOS και Google Android
2011
[24] iSAM: an iPhone stealth airborne malware
Future Challenges in Security and Privacy for Academia and Industry, 2011
[25] David Bayne Cluster 4 August 1, 2011
2011
[26] Securing the use of sensitive data on remote devices using a hardware-software architecture
2010

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.