Skip to main content

SafeCode – Safeguarding Security and Privacy of User Data on Stolen iOS Devices

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7672))

Abstract

Stolen phones, until the descent of smartphones, simply meant minutes’ overages or huge bills from long-distance calls. Now the cost could be anything ranging from your privacy, security, finance or simply “YOU”. A Smartphoneos knowledge of its user, if not protected, is a potential risk to the very user’s security and privacy. When a smartphone is stolen, it isn’t just the device you need to worry about but the treasure of private and sensitive data it holds, which can compromise your very safety and privacy if in the wrong hands. A determined adversary can potentially uncover a lot of things from a stolen iOS device — credit card numbers, passwords of various other accounts, bank account numbers, etc. On top of that, if it’s a work phone, the adversary can also gain entry into your company’s restricted network, which is otherwise highly secure and private. In this paper we propose a simple yet powerful method of protecting the loss of private and sensitive data resident on a stolen iOS devices, focusing mainly on iPhones. SafeCode security mechanism leverages on existing passcode protection mechanism on iOS devices to prevent the device from being “switched off” or “silenced” by the adversary when the device is stolen. SafeCode, in the best case scenario, extends the “window of opportunity” of recovering the stolen device. In the worst case scenario, SafeCode augments the probability of remotely wiping the device with the same extended “window of opportunity”.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ios security. Apple Inc. (May 2012)

    Google Scholar 

  2. The lost smartphone problem-benchmark study of U.S. organizations. Ponemon Institute (October 2011)

    Google Scholar 

  3. How do people use their smartphones? New York Times (September 14, 2010)

    Google Scholar 

  4. Andrews, W.: The smartphone and its risks. RSM McGladrey (2009)

    Google Scholar 

  5. Ritchie, R.: Security researchers: iphone keychain circumvented, data stolen in 6 minutes (February 10, 2011), http://www.imore.com/

  6. Winkler, R.: Carriers band to fight cellphone theft (April 9, 2012), http://online.wsj.com/article/SB10001424052702303815404577334152199453024.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Srinivasan, A., Wu, J. (2012). SafeCode – Safeguarding Security and Privacy of User Data on Stolen iOS Devices. In: Xiang, Y., Lopez, J., Kuo, CC.J., Zhou, W. (eds) Cyberspace Safety and Security. CSS 2012. Lecture Notes in Computer Science, vol 7672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35362-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35362-8_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35361-1

  • Online ISBN: 978-3-642-35362-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics