2016 14th Annual Conference on Privacy, Security and Trust (PST) 2016
DOI: 10.1109/pst.2016.7907000
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability analysis of iPhone 6

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…Fingerprint recognition was also the biometric that the majority of participants had heard of and knowingly used, as seen in Figure 3, Figure 4 and Table 1. However, these fingerprint sensors in our personal devices are easily compromised, as demonstrated by both Yang et al [27] and Kanchikere and Sudha [28]. This highlights that a lack of awareness of other biometric methods is potentially damaging to the personal security of users.…”
Section: Survey Resultsmentioning
confidence: 99%
“…Fingerprint recognition was also the biometric that the majority of participants had heard of and knowingly used, as seen in Figure 3, Figure 4 and Table 1. However, these fingerprint sensors in our personal devices are easily compromised, as demonstrated by both Yang et al [27] and Kanchikere and Sudha [28]. This highlights that a lack of awareness of other biometric methods is potentially damaging to the personal security of users.…”
Section: Survey Resultsmentioning
confidence: 99%
“…From the lifted latent fingerprint, a mold was created by using a printed circuit board (PCB) by a researcher from Chaos Computer Club (CCC). By filling the art glue into the mold on the PCB [23], he subsequently generated a rubber fingerprint film, by which Touch ID of the iPhone can be fooled.…”
Section: Attacks To User Interface and Countermeasuresmentioning
confidence: 99%
“…Apple strongly focuses on having done additional design work to improve its safety. The iOS security model consists of the following architectural design [23][24][25][26][27] System Architecture apple iOS is one of the best operating systems in terms of the boot loading process. Each step in the booting ensures the system is trusted cryptographically and signed by Apple itself.…”
Section: Ios Security Modelmentioning
confidence: 99%
“…Encryption and Data Protection On iOS, the encryption and protection facilities are based on hardware and software technologies. Every iOS has a path between the phone's main memory and the ROM-based storage with the help of a crypto-based key called AES 256 based key to achieve a high level of encryption and security [27]. This SHA-1 cryptographic algorithm is implemented at the hardware level to improve safety for implementing the security overhead.…”
Section: Ios Security Modelmentioning
confidence: 99%