Kontaktujte nás | Jazyk: čeština English
dc.title | Security deficiencies in the architecture and overview of Android and iOS mobile operating systems | en |
dc.contributor.author | Jašek, Roman | |
dc.relation.ispartof | Proceedings of the 10th International Conference on Cyber Warfare and Security (ICCWS-2015) | |
dc.identifier.issn | 2048-9889 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.identifier.isbn | 978-1-910309-97-1 | |
dc.date.issued | 2015 | |
dc.citation.spage | 153 | |
dc.citation.epage | 161 | |
dc.event.title | 10th International Conference on Cyber Warfare and Security (ICCWS) | |
dc.event.location | Univ Venda | |
utb.event.state-en | South Africa | |
utb.event.state-cs | Jihoafrická republika | |
dc.event.sdate | 2015-03-24 | |
dc.event.edate | 2015-03-25 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Academic Conferences Ltd. | |
dc.subject | android | en |
dc.subject | architecture | en |
dc.subject | iOS/IOUS | en |
dc.subject | operating system | en |
dc.subject | security | en |
dc.description.abstract | Mobile operating systems provide a layer with which users exclusively interact. Despite the simplicity of the Graphical User Interface (GUI), the underlying architecture exhibits a high level of complexity, opening attack vectors for adversaries and necessitating security precautions comparable to desktop stations. Developers are aware of the extensive threat potential that small form-factor devices represent and safeguards are deployed to counter the emergence of malicious mobile software. This article details security architecture and proceeds and provides to an overview of the Android and iOS (IOUS) mobile operating systems from a security standpoint, selected on the basis of their opposing approaches to openness and any third-party customizations that users are allowed to perform. The first part provides a brief overview of both systems' system architectures, while the second part presents notable security and reverse engineering milestones. The third part provides recommendations on the safer use of mobile devices, which are extensively discussed. We argue that by practicing proper security hygiene, both existing and novel threats can be mitigated at the user level. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1005777 | |
utb.identifier.obdid | 43874532 | |
utb.identifier.scopus | 2-s2.0-84969242667 | |
utb.identifier.wok | 000364594500020 | |
utb.source | d-wok | |
dc.date.accessioned | 2016-01-15T10:59:51Z | |
dc.date.available | 2016-01-15T10:59:51Z | |
utb.contributor.internalauthor | Jašek, Roman |