iPhone Security Analysis
Vaibhav Ranchhoddas Pandya, Mark Stamp
.
DOI: 10.4236/jis.2010.12009   PDF    HTML     7,010 Downloads   15,521 Views   Citations

Abstract

The release of Apple’s iPhone was one of the most intensively publicized product releases in the history of mobile devices. While the iPhone wowed users with its exciting design and features, it also angered many for not allowing installation of third party applications and for working exclusively with AT & T wireless services (in the US). Besides the US, iPhone was only sold only in a few other selected countries. Software attacks were developed to overcome both limitations. The development of those attacks and further evaluation revealed several vulnerabilities in iPhone security. In this paper, we examine some of the attacks developed for the iPhone as a way of investigating the iPhone’s security structure. We also analyze the security holes that have been discovered and make suggestions for improving iPhone security.

Share and Cite:

V. Pandya and M. Stamp, "iPhone Security Analysis," Journal of Information Security, Vol. 1 No. 2, 2010, pp. 74-87. doi: 10.4236/jis.2010.12009.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] C. Maxcer, “Apple Minus AT&T Equals Lots of iPhones Somewhere Else,” Mac News World. http://www.mac- newsworld.com/story/61389.html?welcome=1209968031
[2] iPhone, Apple–iPhone. http://www.apple.com/iphone/
[3] ARM, ARM1176 Processor. http://www.arm.com/products/CPUs/ARM1176.html
[4] A. L. Shimpi, “Apple’s iPhone Dissected: We did it, so you don’t have to,” Anandtech, 29 June 2007. http://www. anandtech.com/mac/showdoc.aspx?i=3026&p=3
[5] In brief, Network Security, Vol. 2009, No. 7, July 2009, pp. 3.
[6] Best iPhone Apps. http://www.Installerapps.com
[7] K Dunham, “Mobile Malware Attacks and Defense,” Elsevier 2009, pp. 197-265.
[8] B. Haines, “Seven Deadliest Wireless Technologies Attacks,” Syngress, 2010.
[9] Max Console. http://www.maxconsole.net/?mode=news& newsid= 9516
[10] Common Vulnerabilities and Exposures, 2006. http://cve. mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3459
[11] TIFF Library and Utilities, 15 January 2008. http://www. libtiff.org/
[12] National Vulnerability Database, 2006. http://nvd.nist. gov/nvd.cfm?cvename=CVE-2006-3459
[13] “Stack buffer overflow,” Wikipedia. http://en.wikipedia. org/wiki/Stack_buffer_overflow
[14] M. Stamp, “Information Security: Principles and Practice,” Wiley 2005.
[15] C. Cowan, et al., “StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks,” Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, January 26-29, 1998.
[16] “Return-to-libc,” Wikipedia. http://en.wikipedia.org/wiki/ Return-to-libc
[17] Maptools, 15 January 2008. http://dl.maptools.org/dl/lib- tiff/
[18] Adobe Developers Association, TIFF Revision 6.0 Final, 3 June 1992. http://partners.adobe.com/public/developer/ en/tiff/TIFF6.pdf
[19] “Tagged Image File Format,” Wikipedia. http://en.wiki- pedia.org/wiki/TIFF
[20] Simple Machines, The ARM instruction set. http://www. simplemachines.it/doc/arm_inst.pdf
[21] “1176JZF-S Technical Reference Manual Revision r0p7,” ARM. http://infocenter.arm.com/help/topic/com. arm.doc.ddi0301g/DDI0301G_arm1176jzfs_r0p7_trm.pdf
[22] “Little-endian,” Wikipedia. http://en.wikipedia.org/wiki/ Little_endian
[23] Toc2rta, TIFF exploit. http://www.toc2rta.com/files/itiff_ exploit.cpp
[24] “Bloodhound.Exploit.166 Technical Details,” Symantec, 9 November 2007.
[25] V. Pandya., IPhone security analysis, Masters Thesis, Department of Computer Science, San Jose State University, 2008. http://www.cs.sjsu.edu/faculty/stamp/students/ pandya_vaibhav.pdf
[26] Metasploit. http://www.metasploit.com
[27] iPhone UnlockUSA.com. http://iphone.unlock.no
[28] iPhone Sim Free. http://www.iphonesimfree.com
[29] Hackintosh, Turbosim Technical Background. http:// hackint0sh.org/forum/showthread.php?t=18048
[30] Hackintosh, iPhone. http://www.hackint0sh.org
[31] G. Hotz, “On the iPhone,” 15 February 2008. http:// iphonejtag.blogspot.com/
[32] C. Miller, J. Honoroff and J. Mason, “Security Evaluation of Apple’s iPhone,” Independent Security Evaluators, 19 July 2007. http://securityevaluators.com/files/papers/exploitingiphone.pdf
[33] The Webkit Open Source Project. http://webkit.org/
[34] Perl Compatible Regular Expressions, Change log. http:// www.pcre.org/changelog.txt
[35] C. Miller, “Hacking Leopard: Tools and Techniques for Attacking the Newest Mac OS X,” Black Hat Media Archives, 2 August 2007. https://www.blackhat.com/pres- entations/bh-usa-07/Miller/Presentation/bh-usa-07-miller. pdf

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.