期刊文献+

iOS系统数据安全研究 被引量:21

Study on iO S Data Security
原文传递
导出
摘要 移动智能终端是未来信息获取和传播越来越重要的平台,近年来已经开始影响和改变人们的生活。安全界对iO S系统的安全研究也开始逐渐重视,如何有效保护iO S系统数据安全是一项持续而具有挑战的课题。首先,从攻防两个方面对近年来iO S数据安全机制进行了归纳,其次,从iO S文件系统分析、iTunes备份分析和临机取证分析3个方面对iO S数据取证研究进行了总结,最后提出了目前iO S数据安全存在的问题并对未来的研究方向进行了讨论。 Mobile terminal is the important platform for information acquisition and dissemination. In recent years, mobile terminal begins to influence and change people's lives. The security community attaches great importance to the research of lOS security, in particular the lOS data security. Thus, how to protect iOS data security effectively becomes challenging issue. This paper summarizes the research on lOS data security mechanism and forensic analysis in recent years. The existing security issues and possible directions for future research are also discussed.
出处 《信息安全与通信保密》 2012年第8期100-102,105,共4页 Information Security and Communications Privacy
基金 国家自然科学基金资助项目 "海量网络舆情信息获取 分析及表达关键技术研究"(批准号:61171173)
关键词 iOS系统 数据安全 移动安全 取证分析 lOS data security mobile security forensic analysis
  • 相关文献

参考文献15

  • 1PANDYA V R. iPhone Security Analysis[R]. USA : Departmentof Computer Science, San Jose State University, 2008.
  • 2CEDRIC Halbmnn, SIGWALD Jean. iPhone Security Model & Vulnerabilities[R]. France Sogeti: ESEC, 2010.
  • 3BEDRUNE J B, SIGWALD J. iPhone Data Protection in Depth[R]. France Sogeti: ESEC, 2010.
  • 4GEOHOT. Jailbreak[EB/OL]. [2012-3-12]. http: // theiphonewiki.eom/wiki/index.php?title=Jailbreak.
  • 5McAfee Labs. McAfee Threats Report: Third Quarter 2011[EB/OL]. (2011-10)[2012-03-12]. http : IIwww. meafee. com/us/resources/reports/rp-quarterly-threat-q3-2011 .pdf.
  • 6DIONYSUS Blazakis. The Apple Sandbox[R]. USA: Blackhat, 2011.
  • 7MORRISSEY Scan. iOS Forensic Analysis: for iPhone, iPad, andiPod touch[M]. USA: Apress, 2011: 135-206.
  • 8LEY Selena . Processing iPhone / iPod Touch Backup Files on a Computer[EB/OL]. (2010)[2012-03-12]. http: //www. appleexaminer.com/iPhoneiPad/iPhoneBackup/iPhoneBackup.html.
  • 9李柏岚,谷大武,李卷孺,孙明.iOS备份机制中隐私威胁问题的分析[J].通信技术,2012,45(2):25-28. 被引量:9
  • 10PROTALINSKI Emil. Researchers hack iOS Passwords in under Six Minutes[EB/OL]. (2011-2)[2012-03-12]. http : //www.techspot.com/news/42367-researchers-hack- ios-passwords-in-under-six-minutes.html.

二级参考文献9

  • 1CEDRIC H,JEAN S.iPhone Security Model&Vulnerabilities[R].United States:HITB SecConf,2010.
  • 2JEAN-BAPTISTE B,JEAN S.iPhone Data Protection in Depth[R].United States:HITB SecConf,2011.
  • 3STEFAN E.Exploiting the iOS Kernel[R].United States:Black Hat,2011.
  • 4DINO A,DAI Z.Apple iOS Security Evaluation:Vulnerability Analysis and Data Encryption[R].United States:Black Hat,2011.
  • 5EGELE M,KERUEGEL C,KIRDA E,et al.PiOS:Detecting Privacy Leaks in iOS Applications[R].United States:NDSS,2011.
  • 6JONATHAN Z.iPhone Forensics[S].United States:O’Reilly,2008:144.
  • 7SEAN M.iOS Forensic Analysis[S].United States:Apress,2010:317.
  • 8王军选.未来移动通信系统及其关键技术[J].通信技术,2009,42(9):142-144. 被引量:32
  • 9孙利.移动终端定制研究与分析[J].信息通信技术,2010,4(6):49-52. 被引量:2

共引文献9

同被引文献178

引证文献21

二级引证文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部