期刊文献+

iOS系统安全和口令破解研究

Research on System Security and Password Cracking of iOS
下载PDF
导出
摘要 近年来,移动智能终端正在以前所未有的速度发展。移动平台的功能趋于丰富,手机已从以往的电话短信的工具逐渐变为娱乐,商务与社交的设备。用户对于移动终端的安全性也提出了更高的要求。以iOS为操作系统的平台在移动终端领域有举足轻重的地位。本文从系统架构、加密和数据保护、网络安全机制和设备访问控制四方面对iOS系统的数据安全机制进行了分析,并结合一个iOS口令破解的实例,展示了iOS安全机制的实际作用及其局限性,最后对iOS系统安全机制和用户口令破解过程提出了改进建议并提出了未来可能的研究方向。 In recent years, mobile terminal is developing at a high rate.The functions of Mobile platform tend to be rich.Mobile phones have transformed from the tool of phoning and SMS to the platform of entertainment, business and communication.And it also puts forward higher requirements for the safety of the user.iOS oper-ating system has a pivotal position in the field of mobile terminal.This paper analyses iOS data security mech-anisms from aspects of System Architecture,Encryption and Data Protection,Network Security and Device Ac-cess.There is also a password cracking instance, showing the advantages and limitations of iOS security mech-anism.Finally, the paper proposed recommendations for ios security mechanism and passcode cracking.Then possible future research directions about iOS are listed.
作者 李峥嵘
出处 《安阳师范学院学报》 2014年第5期48-51,共4页 Journal of Anyang Normal University
关键词 iOS系统 数据安全 移动安全 口令破解 iOS data security mobile security Passcode cracking
  • 相关文献

参考文献7

  • 1Apple Inc. iOS Security[ EB/OL]. http://www, apple. com/la/iphone/business/docs/iOS - Security - Mayl2. pdf.
  • 2Satish Bommisetty. iPhone Forensics - On iOS 5 [ EB/ OL]. httP://www, securitylearn, net/2012/01/10/ iphone - forensics - on - ios - 5.
  • 3Vaibhav Ranchhoddas Pandya. iPhone sedurity analysis [ R] , V.R. Department of Computer Science, San Jose State University, 2008.
  • 4Geohot. Jailbreak [ EB/OL ]. [ 2012 - 03 - 12 ]. http :// theiphonewiki, com/wiki/index, php title = Jailbreak.
  • 5DaiZovi, Blackhat. Apple iOS Security Evaluation: Vul- nerability Analysis and Data Encryption[ C ]. DC, 2011.
  • 6陈佳霖,王轶骏,薛质.iOS系统数据安全研究[J].信息安全与通信保密,2012,10(8):100-102. 被引量:20
  • 7李柏岚,谷大武,李卷孺,孙明.iOS备份机制中隐私威胁问题的分析[J].通信技术,2012,45(2):25-28. 被引量:8

二级参考文献24

  • 1CEDRIC H,JEAN S.iPhone Security Model&Vulnerabilities[R].United States:HITB SecConf,2010.
  • 2JEAN-BAPTISTE B,JEAN S.iPhone Data Protection in Depth[R].United States:HITB SecConf,2011.
  • 3STEFAN E.Exploiting the iOS Kernel[R].United States:Black Hat,2011.
  • 4DINO A,DAI Z.Apple iOS Security Evaluation:Vulnerability Analysis and Data Encryption[R].United States:Black Hat,2011.
  • 5EGELE M,KERUEGEL C,KIRDA E,et al.PiOS:Detecting Privacy Leaks in iOS Applications[R].United States:NDSS,2011.
  • 6JONATHAN Z.iPhone Forensics[S].United States:O’Reilly,2008:144.
  • 7SEAN M.iOS Forensic Analysis[S].United States:Apress,2010:317.
  • 8PANDYA V R. iPhone Security Analysis[R]. USA : Departmentof Computer Science, San Jose State University, 2008.
  • 9CEDRIC Halbmnn, SIGWALD Jean. iPhone Security Model & Vulnerabilities[R]. France Sogeti: ESEC, 2010.
  • 10BEDRUNE J B, SIGWALD J. iPhone Data Protection in Depth[R]. France Sogeti: ESEC, 2010.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部