An Overview About the Security Architecture of the Mobile Operating System iOS

Authors

  •   Jithu Philip Independent Security Researcher
  •   Merin Raju Lecturer (Computer Science), Department of Commerce, Bishop Kurialacherry College for Women, Amalagiri, Kottayam - 686561, Kerala

DOI:

https://doi.org/10.17010/ijcs/2019/v4/i1/142412

Keywords:

Apple

, Application Security, Data Security, Encryption, iOS, Operating Systems, System Security

Manuscript Received

, November 2, 2018, Revised, November 25, Accepted, December 2, 2018. Date of Publication, January 6, 2019.

Abstract

The use of mobile operating systems is rapidly increasing as the number of smartphone users is increasing day by day. iOS is one of the most popular and widely used mobile operating systems in the world. This document describes an overview about the security features of iOS in its low-level system framework and in its user-level applications framework. The document discusses processes like how security is implemented in the core components of the system, how data protection and encryption is achieved, and how applications are secured by sandboxing.

Downloads

Download data is not yet available.

Downloads

Published

2019-02-11

How to Cite

Philip, J., & Raju, M. (2019). An Overview About the Security Architecture of the Mobile Operating System iOS. Indian Journal of Computer Science, 4(1), 13–18. https://doi.org/10.17010/ijcs/2019/v4/i1/142412

References

iOS Security Overview, 2018. [Online]. Available: https://www.apple.com/business/resources/docs/iOS_Security_Overview.pdf

iOS Security Guide, 2018. [Online]. Available:https://www.apple.com/business/site/docs/iOS_Security_Guide.pdf

B. Guo, "iOS Security," 2014. [Online]. Available: https://www.cse.wustl.edu/~jain/cse571-14/ftp/ios_security/index.html

F. Al-Qershi, M. Al-Qurishi, S. M. M. Rahman and A. Al Amri, "Android vs. iOS: The security battle," In 2014 World Congr. on Comp. Appl. and Inform. Syst. (WCCAIS), pp. 1¬8. IEEE, 17-19 Jan, 2014. http://dx.doi.org/10.1109/WCCAIS.2014.6916629

T. Wang, K. Lu, L. Lu, S. Chung and W. Lee. "Jekyll on iOS: When benign apps become evil," in 22nd Usenix Security Symp., August 14-16, 2013, pp. 559¬572. [Online].Available: https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang_tielei

R. Wang, L. Xing, X. F. Wang and S. Chen. "Unauthorized origin crossing on mobile platforms: Threats and mitigation," In Proc. of the 2013 ACM SIGSAC Conf. on Comp. & Commun. Security, pp. 635¬646. ACM, 2013. [Online]. Available: https://www.informatics.indiana.edu/xw7/papers/wang2013unauthorized.pdf

About Apple File System. [Online]. Available: https://developer.apple.com/documentation/foundation/file_system/about_apple_file_system

Apple File System Programming Guide. [Online]. Available: https://developer.apple.com/library/archive/documentation/FileManagement/Conceptual/FileSystemProgrammingGuide/FileSystemOverview/FileSystemOverview.html

J. R. Vacca, Network and System Security, Syngress, 2010.

M. J. Bach, The Design of the Unix Operating System, Pearson Edu. Inc., 1986.

iOS. [Online]. Available: https://en.wikipedia.org/wiki/IOS

Apple File System. [Online]. Available: https://en.wikipedia.org/wiki/Apple_File_System

ARM Architecture. [Online]. Available: https://en.wikipedia.org/wiki/ARM_architecture

RISC. [Online]. Available: https://en.wikipedia.org/wiki/Reduced_instruction_set_computer