Advertisement

SafeCode – Safeguarding Security and Privacy of User Data on Stolen iOS Devices

  • Avinash Srinivasan
  • Jie Wu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7672)

Abstract

Stolen phones, until the descent of smartphones, simply meant minutes’ overages or huge bills from long-distance calls. Now the cost could be anything ranging from your privacy, security, finance or simply “YOU”. A Smartphoneos knowledge of its user, if not protected, is a potential risk to the very user’s security and privacy. When a smartphone is stolen, it isn’t just the device you need to worry about but the treasure of private and sensitive data it holds, which can compromise your very safety and privacy if in the wrong hands. A determined adversary can potentially uncover a lot of things from a stolen iOS device — credit card numbers, passwords of various other accounts, bank account numbers, etc. On top of that, if it’s a work phone, the adversary can also gain entry into your company’s restricted network, which is otherwise highly secure and private. In this paper we propose a simple yet powerful method of protecting the loss of private and sensitive data resident on a stolen iOS devices, focusing mainly on iPhones. SafeCode security mechanism leverages on existing passcode protection mechanism on iOS devices to prevent the device from being “switched off” or “silenced” by the adversary when the device is stolen. SafeCode, in the best case scenario, extends the “window of opportunity” of recovering the stolen device. In the worst case scenario, SafeCode augments the probability of remotely wiping the device with the same extended “window of opportunity”.

Keywords

Data security data theft device recovery identity theft iOS iPhone security smartphone 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    ios security. Apple Inc. (May 2012)Google Scholar
  2. 2.
    The lost smartphone problem-benchmark study of U.S. organizations. Ponemon Institute (October 2011)Google Scholar
  3. 3.
    How do people use their smartphones? New York Times (September 14, 2010)Google Scholar
  4. 4.
    Andrews, W.: The smartphone and its risks. RSM McGladrey (2009)Google Scholar
  5. 5.
    Ritchie, R.: Security researchers: iphone keychain circumvented, data stolen in 6 minutes (February 10, 2011), http://www.imore.com/
  6. 6.
    Winkler, R.: Carriers band to fight cellphone theft (April 9, 2012), http://online.wsj.com/article/SB10001424052702303815404577334152199453024.html

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Avinash Srinivasan
    • 1
  • Jie Wu
    • 2
  1. 1.Department of Computer ScienceGeorge Mason UniversityFairfaxUSA
  2. 2.Department of Computer and Information SciencesTemple UniversityPhiladelphiaUSA

Personalised recommendations