Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
PSiOS: bring your own privacy & security to iOS devices
Werthmann T., Hund R., Davi L., Sadeghi A., Holz T.  ASIA CCS 2013 (Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China, May 8-10, 2013)13-24.2013.Type:Proceedings
Date Reviewed: Jul 25 2013

PSiOS, short for privacy and security for iOS devices, is a “novel policy enforcement framework for iOS” that is timely and resonates with my concerns about the security of iOS devices such as the iPhone and iPad. Sophos (http://sophos.com) provides a free Android security app for a single device that analyzes and manages vulnerabilities. However, the proprietary closed-source iOS system does not support this type of access, even to improve security.

PSiOS is controlled by the user and is effective even without access to iOS or the Objective-C source code. This is a crucial development because many apps are able to use the device camera and video without user knowledge and have read/write access to files, accounts, and contacts. iOS assigns a “generic sandbox to all third-party apps,” and this is known to be a vulnerability readily exploited by genuinely malicious apps.

The framework developed by the authors involves reverse engineering and rewriting the application binary. Checkpoints are inserted into the application and are invoked each time an Objective-C call is made. From this, a validation request is triggered. The PSiOS framework is successfully demonstrated and evaluated using SpyPhone, an app created to steal user data from an iOS device. The testbed deployed by the authors uses several apps, including Facebook.

If you are interested in the differences between Android and iOS security or the complexity of securing vulnerabilities in proprietary closed-source apps and devices, you will find this novel approach very relevant.

Reviewer:  Alyx Macfadyen Review #: CR141396 (1310-0922)
Bookmark and Share
  Editor Recommended
Featured Reviewer
 
 
Access Controls (D.4.6 ... )
 
 
Macintosh OS (D.4.0 ... )
 
 
Portable Devices (C.5.3 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Access Controls": Date
Access control lists in capability environments
Lopriore L. Technology and Science of Informatics 3(3): 163-174, 1984. Type: Article
Mar 1 1985
Some variants of the take-grant protection model
Biskup J. (ed) Information Processing Letters 19(3): 151-156, 1984. Type: Article
Jun 1 1985
On access checking in capability-based systems
Kain R., Landwehr C. (ed) IEEE Transactions on Software Engineering SE-13(2): 202-207, 1987. Type: Article
Dec 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy