期刊文献+

iOS系统数据安全分析与加固 被引量:2

Data Security Analysis and Enhancement of iOS System
原文传递
导出
摘要 手机在如今的通讯手段中,占据举足轻重的地位,特别是随着社交网络、电子邮件、即时通讯等软件的频繁使用,越来越多的用户隐私信息也都被存储在手机之中。智能手机操作系统的数据安全,成为今日关注的焦点。文中深入研究了iOS系统的各项安全机制,分析在iOS系统越狱对安全机制的影响,以及敏感数据泄露的可能性。然后根据iOS系统越狱后暴露的安全性问题,分析研究了可能的植入方式。最后讨论了恶意程序检测手段,再针对越狱iOS系统出现的安全隐患,提出了安全加固的防范性措施。 Mobile devices, especially smartphones, occupy a large proportion of people' s daily communication. Smartphones contain more sensitive data than normal personal computers, such as call history, contacts and messages. Mobile security tends to be the main concern currently. This paper analyzes the security issues about lOS system, and points out the risks of iOS system's security. Finally, aiming at these safety problems, many solutions are proposed to enhance security and stability of jailbroken iOS system.
出处 《通信技术》 2014年第6期668-673,共6页 Communications Technology
基金 信息网络安全公安部重点实验室开放课题(No.C12609)~~
关键词 移动安全 iOS系统 iOS越狱 数据安全 安全加固 mobile security iOS system lOS jailbreak data security security enhancement
  • 相关文献

参考文献20

  • 1ho M. Mobile Phones, Japanese Youth, and the Re- placement of Social Contact [ M ]. London: Springer, 2005:131-148.
  • 2HALPERT B. Mobile Device Security[ C ]//Proceedings of the 1 st Annual Conference on Information Security Cur- riculum Development. Kuala Lumpur, Malaysia: ACM, 2004 : 99-101.
  • 3李柏岚,谷大武,李卷孺,孙明.iOS备份机制中隐私威胁问题的分析[J].通信技术,2012,45(2):25-28. 被引量:8
  • 4PANDYA V R. IPhone Security Analysis [ D ]. San Jose: San Jose State University, 2008.
  • 5HALBRONN C, SIGWALD J. iPhone Security Model & Vulnerabilities [ EB/OL ]. Kuala Lumpur, Malaysia: HITB SeeConf, 2010 (2010-10-17) [2013-09-25]. https://esee-lab, sogeti. com/dotelear/publie/publiea- tions/10-hitbkl-iphone. pdf.
  • 6BeDRUNE J B, SIGWALD J. IPhone Data Protection in Depth [ R ]. France Sogeti: ESEC,2010.
  • 7GEOHOT. Jailbreak[ EB/OL]. (2014-01-05) [ 2014- 01 - 12 ]. http://theiphonewiki, com/wiki/index, php? title = Jailbreak.
  • 8陈佳霖,王轶骏,薛质.iOS系统数据安全研究[J].信息安全与通信保密,2012,10(8):100-102. 被引量:20
  • 9FELT A P, FINIFTER M, CHINE, et al. A Survey of Mobile Malware in the Wilde[C]//Proceeclings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. Malaysia: ACM, 2011 : 3-14.
  • 10WATSON R, MORRISON W, VANCE C, et al. The Trusted BSD MAC Framework: Extensible Kernel Ac- cess Control for Free BSD 5.0 [ C ]//Proc. 2003 USE- NIX Annual Technical Conference. San Antonio, Tex- as : FREENIX Track,2003:285-296.

二级参考文献32

  • 1王视环.蜂窝网与GPS相结合的手机混合定位技术-gpsOne[J].信息与电子工程,2004,2(3):238-240. 被引量:10
  • 2沈晖,季承,傅海阳.无线通信中的定位技术及其业务[J].电力系统通信,2005,26(4):1-3. 被引量:9
  • 3赵娜 胡彩波 潘颖等.GPS辅助定位技术研究现状及分析.全球定位系统,2008,33(10):137-142.
  • 4Al-Bayari O, Sadoun B. New centralized automatic vehicle location communications software system un- der GIS environment [J]. International Journal of Communication Systems, 2005,18 (9) : 833-846.
  • 5Sudip M, John Oommen B. Dynamic algorithms for the shortest pathrouting problem: Learning automa- ta-based solutions. Source[J]. IEEE Transactions On Systems,Man And Cybernetics-Part B: Cybernet-ics,2005,35(6):1179-1192.
  • 6Borenovic M N, Simic M I, Neskovie A M, et al . Enhanced cell--ID-b TA GSM positioning technique [C]//The International Conference on Computer as a Tool, 2005 : 1176-1179.
  • 7寇艳红.GPS原理与应用[M].2版.北京:北京电子工业出版社,2007.
  • 8CEDRIC H,JEAN S.iPhone Security Model&Vulnerabilities[R].United States:HITB SecConf,2010.
  • 9JEAN-BAPTISTE B,JEAN S.iPhone Data Protection in Depth[R].United States:HITB SecConf,2011.
  • 10STEFAN E.Exploiting the iOS Kernel[R].United States:Black Hat,2011.

共引文献36

同被引文献8

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部