Explore chapters and articles related to this topic
Mobile Device Security
Published in Kutub Thakur, Al-Sakib Khan Pathan, Cybersecurity Fundamentals, 2020
Kutub Thakur, Al-Sakib Khan Pathan
The entire OS is written with different programming languages such as Objective-C, C++, C, and Swift. The first version of iOS was released on June 29, 2007. The latest stable version released by Apple Inc., is known as iOS 12.1.4, which was released in the first week of February 2019. The beta version of iOS 12.2 has also been released on February 19, 2019.
Attacking Smartphone Security and Privacy
Published in Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos, Intrusion Detection and Prevention for Mobile Ecosystems, 2017
Vincent F. Taylor, Ivan Martinovic
iOS is a mobile operating system developed by Apple Inc. It has a healthy app ecosystem that surrounds it with over 1.4 million iOS applications available for download. The operating system itself is proprietary, closed source, and written in C, C++, Objective-C, and Swift. It is a Unix-like operating system and features a hybrid kernel that runs on 64/32-bit ARM processors. Before iOS apps are made available to the public in the Apple App Store, they must undergo a thorough vetting process by Apple. Apps must pass reliability testing and other analysis to ensure that they are not malicious or otherwise unsavory. Apple's vetting process includes manual testing and static analysis to determine whether an app tries to perform actions outside of what it claims to do [6]. This vetting process is not always perfect and indeed security researchers have uncovered ways of circumventing the protections put in place by Apple [7]. In the case of Jekyll [8], the malicious app passed the vetting process by rearranging its code to add new, malicious functionality, after passing the approval process. The iOS kernel uses code signing to ensure that all apps running on a device come from an approved source and have not been tampered with [9]. Additionally, all third-party apps are sandboxed by iOS to prevent them from accessing data stored by other apps and modifying the system. However, Han et al. described how to “break out” of the iOS sandbox by leveraging dynamically loaded, private APIs in malicious apps [10]. Finally, iOS enforces a secure boot chain and file encryption using a per-file key.
Mobile Platforms
Published in Jithesh Sathyan, Anoop Narayanan, Navin Narayan, K V Shibu, A Comprehensive Guide to Enterprise Mobility, 2016
Jithesh Sathyan, Anoop Narayanan, Navin Narayan, K V Shibu
Apple's mobile OS is known as iOS (previously called iPhone OS). iOS was originally developed for iPhone but later extended to support other Apple mobility devices. iOS is the OS in iPhone, iPad, and iPod touch devices. iPhone is believed to be a revolution in mobile phones market because of its unique UI and deep integration with the web (Figure 18.6).
FloVasion: Towards Detection of non-sensitive Variable Based Evasive Information-Flow in Android Apps
Published in IETE Journal of Research, 2022
Bharat Buddhadev, Parvez Faruki, Manoj Singh Gaur, Shubham Kharche, Akka Zemmari
Android is the most popular mobile Operating System (OS) as compared to iOS, and Blackberry [1]. Google Play, the official app market hosts 2.9 million developer apps [2]. Lack of strict app vetting raises security and quality concern for the Android ecosystem [3]. Information-flow based analysis techniques characterize an app as Potentially Unwanted App (PUA) if there is non-negligible probability of any explicit or implicit information leakage. Information-flow tracking techniques monitor app information flow through different variables and app components to detect information leakage [4]. App behavior can be tracked and represented via data or information-flow. In information flow terminology, “Source” is a point where data enters the app and “Sink” is where data leaves the program again [5]. The proposed approach in this article demonstrates novel techniques which evade the existing state-of-the-art information flow detection tools by facilitating the sensitive data-flow via non-sensitive variables. Furthermore, we propose an AspectJ based solution to detect non-sensitive variable based information leakage.
The way you listen to music: effect of swiping direction and album arts on adoption of music streaming application
Published in Behaviour & Information Technology, 2021
Mobile responsive webpages (see Figure 2) were developed by a professional IT (information technology) development and management firm. A detailed RS (requirement specification) was provided to the IT firm to develop an application and four separate mobile responsive webpages. Our research context is the music streaming application which is mostly used in mobile devices. A mobile app (Android version) was also developed incorporating all four conditions. But the mobile application was not used for our study as a downloadable link of the mobile application is difficult to distribute. Moreover, the usability of applications are mobile operating system dependent (e.g. android, windows, iOS etc.). So, our developed android application is not in use for participants who are using other mobile operating systems. Mobile responsive webpages were developed for four conditions that congruent with mobile applications so that analogous screens participants can experience while browsing the mobile application.
Too Much of a Good Thing: Investigating the Association between Actual Smartphone Use and Individual Well-Being
Published in International Journal of Human–Computer Interaction, 2018
Meredith E. David, James A. Roberts, Brett Christenson
In April of 2015, Apple released version 8.3 of its iOS operating system for the iPhone, iPad, and iPod touch (iOS version history, 2016). A new feature included in the iOS 8 Settings application allows the ability to track battery usage per each app a user has installed on their device. This method is very similar to tracking a users’ cellular usage data. In previous versions of the operating system, the Settings application would only show a summation of battery usage by applications along with how long the battery was on standby since the last full charge. With the updates included in iOS 8, however, the displayed data now includes a more defined, or itemized, list of the individual apps a user had running, open on screen or running in background, how long the app was used, and how the usage of the app affected battery use (Guarino, 2015).