Team for Research in
Ubiquitous Secure Technology

iPhone Security Analysis
Mark Stamp, Vaibhav Pandya

Citation
Mark Stamp, Vaibhav Pandya. "iPhone Security Analysis". International Journal of Multimedia Intelligence and Security, 2010.

Abstract
The release of Apple’s iPhone was one of the most intensively publicized product releases in the history of mobile devices. While the iPhone wowed users with its exciting design and features, it also angered many for not allowing installation of third party applications and for working exclusively with AT&T wireless services (in the US). Besides the US, iPhone was only sold only in a few other selected countries. Software attacks were developed to overcome both limitations. The development of those attacks and further evaluation revealed several vulnerabilities in iPhone security. In this paper, we examine some of the attacks developed for the iPhone as a way of investigating the iPhone’s security structure. We also analyze the security holes that have been discovered and make suggestions for improving iPhone security.

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    Mark Stamp, Vaibhav Pandya. <a
    href="http://www.truststc.org/pubs/697.html"
    >iPhone Security Analysis</a>,
    <i>International Journal of Multimedia Intelligence
    and Security</i>,  2010.
  • Plain text
    Mark Stamp, Vaibhav Pandya. "iPhone Security
    Analysis". <i>International Journal of Multimedia
    Intelligence and Security</i>,  2010.
  • BibTeX
    @article{StampPandya10_IPhoneSecurityAnalysis,
        author = {Mark Stamp and Vaibhav Pandya},
        title = {iPhone Security Analysis},
        journal = {International Journal of Multimedia Intelligence
                  and Security},
        year = {2010},
        abstract = {The release of Apple’s iPhone was one of the
                  most intensively publicized product releases in
                  the history of mobile devices. While the iPhone
                  wowed users with its exciting design and features,
                  it also angered many for not allowing installation
                  of third party applications and for working
                  exclusively with AT\&T wireless services (in the
                  US). Besides the US, iPhone was only sold only in
                  a few other selected countries. Software attacks
                  were developed to overcome both limitations. The
                  development of those attacks and further
                  evaluation revealed several vulnerabilities in
                  iPhone security. In this paper, we examine some of
                  the attacks developed for the iPhone as a way of
                  investigating the iPhone’s security structure.
                  We also analyze the security holes that have been
                  discovered and make suggestions for improving
                  iPhone security.},
        URL = {http://www.truststc.org/pubs/697.html}
    }
    

Posted by Mark Stamp on 4 Apr 2010.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.