An Overview About the Security Architecture of the Mobile Operating System iOS
DOI:
https://doi.org/10.17010/ijcs/2019/v4/i1/142412Keywords:
Apple
, Application Security, Data Security, Encryption, iOS, Operating Systems, System SecurityManuscript Received
, November 2, 2018, Revised, November 25, Accepted, December 2, 2018. Date of Publication, January 6, 2019.Abstract
The use of mobile operating systems is rapidly increasing as the number of smartphone users is increasing day by day. iOS is one of the most popular and widely used mobile operating systems in the world. This document describes an overview about the security features of iOS in its low-level system framework and in its user-level applications framework. The document discusses processes like how security is implemented in the core components of the system, how data protection and encryption is achieved, and how applications are secured by sandboxing.Downloads
Downloads
Published
How to Cite
Issue
Section
References
iOS Security Overview, 2018. [Online]. Available: https://www.apple.com/business/resources/docs/iOS_Security_Overview.pdf
iOS Security Guide, 2018. [Online]. Available:https://www.apple.com/business/site/docs/iOS_Security_Guide.pdf
B. Guo, "iOS Security," 2014. [Online]. Available: https://www.cse.wustl.edu/~jain/cse571-14/ftp/ios_security/index.html
F. Al-Qershi, M. Al-Qurishi, S. M. M. Rahman and A. Al Amri, "Android vs. iOS: The security battle," In 2014 World Congr. on Comp. Appl. and Inform. Syst. (WCCAIS), pp. 1¬8. IEEE, 17-19 Jan, 2014. http://dx.doi.org/10.1109/WCCAIS.2014.6916629
T. Wang, K. Lu, L. Lu, S. Chung and W. Lee. "Jekyll on iOS: When benign apps become evil," in 22nd Usenix Security Symp., August 14-16, 2013, pp. 559¬572. [Online].Available: https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang_tielei
R. Wang, L. Xing, X. F. Wang and S. Chen. "Unauthorized origin crossing on mobile platforms: Threats and mitigation," In Proc. of the 2013 ACM SIGSAC Conf. on Comp. & Commun. Security, pp. 635¬646. ACM, 2013. [Online]. Available: https://www.informatics.indiana.edu/xw7/papers/wang2013unauthorized.pdf
About Apple File System. [Online]. Available: https://developer.apple.com/documentation/foundation/file_system/about_apple_file_system
Apple File System Programming Guide. [Online]. Available: https://developer.apple.com/library/archive/documentation/FileManagement/Conceptual/FileSystemProgrammingGuide/FileSystemOverview/FileSystemOverview.html
J. R. Vacca, Network and System Security, Syngress, 2010.
M. J. Bach, The Design of the Unix Operating System, Pearson Edu. Inc., 1986.
iOS. [Online]. Available: https://en.wikipedia.org/wiki/IOS
Apple File System. [Online]. Available: https://en.wikipedia.org/wiki/Apple_File_System
ARM Architecture. [Online]. Available: https://en.wikipedia.org/wiki/ARM_architecture
RISC. [Online]. Available: https://en.wikipedia.org/wiki/Reduced_instruction_set_computer