SafeCode - Safeguarding security and privacy of user data on stolen iOS devices

7Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Stolen phones, until the descent of smartphones, simply meant minutes' overages or huge bills from long-distance calls. Now the cost could be anything ranging from your privacy, security, finance or simply "YOU". A Smartphoneos knowledge of its user, if not protected, is a potential risk to the very user's security and privacy. When a smartphone is stolen, it isn't just the device you need to worry about but the treasure of private and sensitive data it holds, which can compromise your very safety and privacy if in the wrong hands. A determined adversary can potentially uncover a lot of things from a stolen iOS device - credit card numbers, passwords of various other accounts, bank account numbers, etc. On top of that, if it's a work phone, the adversary can also gain entry into your company's restricted network, which is otherwise highly secure and private. In this paper we propose a simple yet powerful method of protecting the loss of private and sensitive data resident on a stolen iOS devices, focusing mainly on iPhones. SafeCode security mechanism leverages on existing passcode protection mechanism on iOS devices to prevent the device from being "switched off" or "silenced" by the adversary when the device is stolen. SafeCode, in the best case scenario, extends the "window of opportunity" of recovering the stolen device. In the worst case scenario, SafeCode augments the probability of remotely wiping the device with the same extended "window of opportunity". © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Srinivasan, A., & Wu, J. (2012). SafeCode - Safeguarding security and privacy of user data on stolen iOS devices. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7672 LNCS, pp. 11–20). https://doi.org/10.1007/978-3-642-35362-8_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free