期刊文献+

iOS备份机制中隐私威胁问题的分析 被引量:9

Analysis on Privacy Threats in iOS Backup Mechanism
原文传递
导出
摘要 目前,iOS安全研究主要在应用程序安全性检测、安全模型剖析、漏洞和数据保护机制分析等方面,对于iOS备份机制的安全性缺乏深入系统地研究。备份是iOS系统中惟一合法获得设备内部数据的渠道,但是备份数据缺少必要防护措施,用户数据安全和隐私受到潜在威胁。通过描述备份分析的方法,进而对备份存储数据进行深入理解,发现其存在严重隐私威胁,忽视对第三方应用程序数据信息的保护,最后评估了备份机制潜在的安全影响并给出提高备份安全性的建议。 The security research of iOS mainly focuses on detection application security,privacy vulnerabilities,analysis of security model,and data protection mechanism,etc.,while less in-depth study on backup mechanism security.Backup is the only certificated channel for acquisition of the data inside iOS devices.However,the transmitted data is short of necessary protective measures,thus leading to security and privacy threats.The method for backup analysis is described,and in-depth understanding of the backup data reveals that the serious privacy threats exist in iOS backup the protections of the third-party application data neglected.Finally,potential security vulnerabilities of the back-up mechanism are evaluated,and the security suggestions for protection of backup data proposed.
出处 《通信技术》 2012年第2期25-28,共4页 Communications Technology
基金 国家自然科学基金(批准号:61100209) 上海市高新技术产业化重点项目资助
关键词 备份机制 隐私泄漏 第三方应用 backup privacy leakage third-party application
  • 相关文献

参考文献9

  • 1CEDRIC H,JEAN S.iPhone Security Model&Vulnerabilities[R].United States:HITB SecConf,2010.
  • 2JEAN-BAPTISTE B,JEAN S.iPhone Data Protection in Depth[R].United States:HITB SecConf,2011.
  • 3STEFAN E.Exploiting the iOS Kernel[R].United States:Black Hat,2011.
  • 4DINO A,DAI Z.Apple iOS Security Evaluation:Vulnerability Analysis and Data Encryption[R].United States:Black Hat,2011.
  • 5EGELE M,KERUEGEL C,KIRDA E,et al.PiOS:Detecting Privacy Leaks in iOS Applications[R].United States:NDSS,2011.
  • 6JONATHAN Z.iPhone Forensics[S].United States:O’Reilly,2008:144.
  • 7SEAN M.iOS Forensic Analysis[S].United States:Apress,2010:317.
  • 8王军选.未来移动通信系统及其关键技术[J].通信技术,2009,42(9):142-144. 被引量:32
  • 9孙利.移动终端定制研究与分析[J].信息通信技术,2010,4(6):49-52. 被引量:2

二级参考文献10

共引文献32

同被引文献83

  • 1王海英,周长伦,亓丕水,宋佐江,位晓晓.智能手机数据的提取与恢复[J].机械管理开发,2012,27(1):189-191. 被引量:6
  • 2PANDYA V R. iPhone Security Analysis[R]. USA : Departmentof Computer Science, San Jose State University, 2008.
  • 3CEDRIC Halbmnn, SIGWALD Jean. iPhone Security Model & Vulnerabilities[R]. France Sogeti: ESEC, 2010.
  • 4BEDRUNE J B, SIGWALD J. iPhone Data Protection in Depth[R]. France Sogeti: ESEC, 2010.
  • 5GEOHOT. Jailbreak[EB/OL]. [2012-3-12]. http: // theiphonewiki.eom/wiki/index.php?title=Jailbreak.
  • 6McAfee Labs. McAfee Threats Report: Third Quarter 2011[EB/OL]. (2011-10)[2012-03-12]. http : IIwww. meafee. com/us/resources/reports/rp-quarterly-threat-q3-2011 .pdf.
  • 7DIONYSUS Blazakis. The Apple Sandbox[R]. USA: Blackhat, 2011.
  • 8MORRISSEY Scan. iOS Forensic Analysis: for iPhone, iPad, andiPod touch[M]. USA: Apress, 2011: 135-206.
  • 9LEY Selena . Processing iPhone / iPod Touch Backup Files on a Computer[EB/OL]. (2010)[2012-03-12]. http: //www. appleexaminer.com/iPhoneiPad/iPhoneBackup/iPhoneBackup.html.
  • 10PROTALINSKI Emil. Researchers hack iOS Passwords in under Six Minutes[EB/OL]. (2011-2)[2012-03-12]. http : //www.techspot.com/news/42367-researchers-hack- ios-passwords-in-under-six-minutes.html.

引证文献9

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部