Publikace UTB
Repozitář publikační činnosti UTB

Security deficiencies in the architecture and overview of Android and iOS mobile operating systems

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Security deficiencies in the architecture and overview of Android and iOS mobile operating systems en
dc.contributor.author Jašek, Roman
dc.relation.ispartof Proceedings of the 10th International Conference on Cyber Warfare and Security (ICCWS-2015)
dc.identifier.issn 2048-9889 Scopus Sources, Sherpa/RoMEO, JCR
dc.identifier.isbn 978-1-910309-97-1
dc.date.issued 2015
dc.citation.spage 153
dc.citation.epage 161
dc.event.title 10th International Conference on Cyber Warfare and Security (ICCWS)
dc.event.location Univ Venda
utb.event.state-en South Africa
utb.event.state-cs Jihoafrická republika
dc.event.sdate 2015-03-24
dc.event.edate 2015-03-25
dc.type conferenceObject
dc.language.iso en
dc.publisher Academic Conferences Ltd.
dc.subject android en
dc.subject architecture en
dc.subject iOS/IOUS en
dc.subject operating system en
dc.subject security en
dc.description.abstract Mobile operating systems provide a layer with which users exclusively interact. Despite the simplicity of the Graphical User Interface (GUI), the underlying architecture exhibits a high level of complexity, opening attack vectors for adversaries and necessitating security precautions comparable to desktop stations. Developers are aware of the extensive threat potential that small form-factor devices represent and safeguards are deployed to counter the emergence of malicious mobile software. This article details security architecture and proceeds and provides to an overview of the Android and iOS (IOUS) mobile operating systems from a security standpoint, selected on the basis of their opposing approaches to openness and any third-party customizations that users are allowed to perform. The first part provides a brief overview of both systems' system architectures, while the second part presents notable security and reverse engineering milestones. The third part provides recommendations on the safer use of mobile devices, which are extensively discussed. We argue that by practicing proper security hygiene, both existing and novel threats can be mitigated at the user level. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1005777
utb.identifier.obdid 43874532
utb.identifier.scopus 2-s2.0-84969242667
utb.identifier.wok 000364594500020
utb.source d-wok
dc.date.accessioned 2016-01-15T10:59:51Z
dc.date.available 2016-01-15T10:59:51Z
utb.contributor.internalauthor Jašek, Roman
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam