2017
DOI: 10.1016/j.amc.2016.08.051
|View full text |Cite
|
Sign up to set email alerts
|

A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…is research addresses major economic, production, corporate, and commercial requirement issues. e success of IoT also relies on the lucrative contract that every IoT approach has for regulatory affairs [103]. IoT security issues must provide solutions for user's protection from attackers as well as all unauthorized people.…”
Section: Discussionmentioning
confidence: 99%
“…is research addresses major economic, production, corporate, and commercial requirement issues. e success of IoT also relies on the lucrative contract that every IoT approach has for regulatory affairs [103]. IoT security issues must provide solutions for user's protection from attackers as well as all unauthorized people.…”
Section: Discussionmentioning
confidence: 99%
“…Apple strongly focuses on having done additional design work to improve its safety. The iOS security model consists of the following architectural design [23][24][25][26][27] System Architecture apple iOS is one of the best operating systems in terms of the boot loading process. Each step in the booting ensures the system is trusted cryptographically and signed by Apple itself.…”
Section: Ios Security Modelmentioning
confidence: 99%
“…In our work, we rely on TEEs to reduce the likelihood of software vulnerabilities that can be exploited by an adversary, as well as to reduce their impact through partitioning. For instance, the authors explain attacks to obtain users' data and recognise that these attacks would not have been possible if the data were encrypted. Our partitioning approach using TEEs provides an efficient solution to this challenge.…”
Section: Related Workmentioning
confidence: 99%