메뉴 건너뛰기




Volumn 79, Issue , 2018, Pages 247-261

Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps

Author keywords

Advanced persistent threat investigations; iOS cloud apps; iOS cloud forensics; iOS security taxonomy

Indexed keywords

DIGITAL DEVICES; IOS (OPERATING SYSTEM); TAXONOMIES;

EID: 85006994029     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2016.11.010     Document Type: Article
Times cited : (38)

References (42)
  • 1
    • 85035043216 scopus 로고    scopus 로고
    • Apple, iOS Security, viewed 28 June, 2015
    • Apple, iOS Security, 2015, viewed 28 June 2016. https://www.apple.com/business/docs/iOS_Security_Guide.pdf.
    • (2016)
  • 2
    • 84869429339 scopus 로고    scopus 로고
    • The most dangerous code in the world: validating SSL certificates in non-browser software
    • Proceedings of the ACM Conference on Computer and Communications Security
    • M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, V. Shmatikov, The most dangerous code in the world: validating SSL certificates in non-browser software, in: Proceedings of the ACM Conference on Computer and Communications Security, 2012, pp. 38–49.
    • (2012) , pp. 38-49
    • Georgiev, M.1    Iyengar, S.2    Jana, S.3    Anubhai, R.4    Boneh, D.5    Shmatikov, V.6
  • 3
    • 85035010942 scopus 로고    scopus 로고
    • The San Bernardino iPhone case is over; the war has just begun, 29 March, AppAdvice, viewed 28 June, 2016
    • J. Byrnes, The San Bernardino iPhone case is over; the war has just begun, 29 March, AppAdvice, 2016, viewed 28 June 2016. http://appadvice.com/post/the-san-bernardino-iphone-case-is-over-the-war-has-just-begun/709112.
    • (2016)
    • Byrnes, J.1
  • 4
    • 85034966208 scopus 로고    scopus 로고
    • Uber's App is Anything but Malware, 10 December, BETTER, viewed 28 June, 2014
    • W. Clark, Uber's App is Anything but Malware, 10 December, BETTER, 2014, viewed 28 June 2016. http://better.mobi/2014/12/10/ubers-app-is-anything-but-malware/.
    • (2016)
    • Clark, W.1
  • 5
    • 84870243026 scopus 로고    scopus 로고
    • An integrated conceptual digital forensic framework for cloud computing
    • Martini, B., Choo, K.-K.R., An integrated conceptual digital forensic framework for cloud computing. Digit. Investig. 9:2 (2012), 71–80.
    • (2012) Digit. Investig. , vol.9 , Issue.2 , pp. 71-80
    • Martini, B.1    Choo, K.-K.R.2
  • 6
    • 84896319180 scopus 로고    scopus 로고
    • Google drive: Forensic analysis of data remnants
    • Quick, D., Choo, K.-K.R., Google drive: Forensic analysis of data remnants. J. Netw. Comput. Appl. 40 (2014), 179–193.
    • (2014) J. Netw. Comput. Appl. , vol.40 , pp. 179-193
    • Quick, D.1    Choo, K.-K.R.2
  • 7
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: Data remnants on user machines
    • Quick, D., Choo, K.-K.R., Dropbox analysis: Data remnants on user machines. Digit. Investig. 10:1 (2013), 3–18.
    • (2013) Digit. Investig. , vol.10 , Issue.1 , pp. 3-18
    • Quick, D.1    Choo, K.-K.R.2
  • 8
    • 84884589497 scopus 로고    scopus 로고
    • Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
    • Quick, D., Choo, K.-K.R., Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?. Digit. Investig. 10:3 (2013), 266–277.
    • (2013) Digit. Investig. , vol.10 , Issue.3 , pp. 266-277
    • Quick, D.1    Choo, K.-K.R.2
  • 9
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: Microsoft SkyDrive forensic data remnants
    • Quick, D., Choo, K.-K.R., Digital droplets: Microsoft SkyDrive forensic data remnants. Future Gener. Comput. Syst. 29:6 (2013), 1378–1394.
    • (2013) Future Gener. Comput. Syst. , vol.29 , Issue.6 , pp. 1378-1394
    • Quick, D.1    Choo, K.-K.R.2
  • 10
    • 84902429611 scopus 로고    scopus 로고
    • Cloud Storage Forensics
    • Syngress/ Elsevier
    • Quick, D., Martini, B., Choo, K.-K.R., Cloud Storage Forensics. 2013, Syngress/ Elsevier.
    • (2013)
    • Quick, D.1    Martini, B.2    Choo, K.-K.R.3
  • 11
    • 84920152770 scopus 로고    scopus 로고
    • Distributed filesystem forensics: XtreemFS as a case study
    • Martini, B., Choo, K.-K.R., Distributed filesystem forensics: XtreemFS as a case study. Digit. Investig. 11:4 (2014), 295–313.
    • (2014) Digit. Investig. , vol.11 , Issue.4 , pp. 295-313
    • Martini, B.1    Choo, K.-K.R.2
  • 12
    • 84961218182 scopus 로고    scopus 로고
    • Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices
    • Daryabar, F., Dehghantanha, A., Eterovic-Soric, B., Choo, K.-K.R., Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices. Aust. J. Forensic Sci. (AJFS), 2016, 10.1080/00450618.2015.1110620.
    • (2016) Aust. J. Forensic Sci. (AJFS)
    • Daryabar, F.1    Dehghantanha, A.2    Eterovic-Soric, B.3    Choo, K.-K.R.4
  • 16
    • 84963613034 scopus 로고    scopus 로고
    • Forensic taxonomy of popular android nhealth apps
    • Proceedings of the Americas Conference on Information Systems, AMCIS, Puerto Rico, USA.
    • A. Azfar, K.-K.R. Choo, L. Liu, Forensic taxonomy of popular android nhealth apps, in: Proceedings of the Americas Conference on Information Systems, AMCIS, Puerto Rico, USA, 2015.
    • (2015)
    • Azfar, A.1    Choo, K.-K.R.2    Liu, L.3
  • 17
    • 84986921995 scopus 로고    scopus 로고
    • An android communication app forensic taxonomy
    • Azfar, A., Choo, K.-K.R., Liu, L., An android communication app forensic taxonomy. J. Forensic Sci. 61:5 (2016), 1337–1350.
    • (2016) J. Forensic Sci. , vol.61 , Issue.5 , pp. 1337-1350
    • Azfar, A.1    Choo, K.-K.R.2    Liu, L.3
  • 18
  • 19
    • 84978047769 scopus 로고    scopus 로고
    • Forensic taxonomy of android productivity apps
    • in press.
    • Azfar, A., Choo, K.-K.R., Liu, L., Forensic taxonomy of android productivity apps. Multimedia Tools Appl., 2016 in press. http://dx.doi.org/10.1007/s11042-016-3718-2.
    • (2016) Multimedia Tools Appl.
    • Azfar, A.1    Choo, K.-K.R.2    Liu, L.3
  • 20
    • 84942364406 scopus 로고    scopus 로고
    • A taxonomy of mhealth apps–security and privacy concerns
    • Proceedings of the Hawaii International Conference on System Sciences, HICSS, Kauai, HI
    • M. Plachkinova, S. Andrés, S. Chatterjee, A taxonomy of mhealth apps–security and privacy concerns, in: Proceedings of the Hawaii International Conference on System Sciences, HICSS, Kauai, HI, 2015, pp. 3187–3196.
    • (2015) , pp. 3187-3196
    • Plachkinova, M.1    Andrés, S.2    Chatterjee, S.3
  • 21
    • 84967138126 scopus 로고    scopus 로고
    • Android cache taxonomy and forensic process
    • IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland
    • F. Immanuel, B. Martini, K.-K.R. Choo, Android cache taxonomy and forensic process, in: IEEE Trustcom/BigDataSE/ISPA, Vol. 1, Helsinki, Finland, 2015, pp. 1094–1101.
    • (2015) , vol.1 , pp. 1094-1101
    • Immanuel, F.1    Martini, B.2    Choo, K.-K.R.3
  • 22
    • 84950250183 scopus 로고    scopus 로고
    • A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
    • New York, NY, USA
    • Heartfield, R., Loukas, G., A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Comput. Surv. (CSUR), 48(3), 2016, 10.1145/2835375 New York, NY, USA.
    • (2016) ACM Comput. Surv. (CSUR) , vol.48 , Issue.3
    • Heartfield, R.1    Loukas, G.2
  • 24
    • 84925118436 scopus 로고    scopus 로고
    • Cloud forensic technical challenges and solutions: A snapshot
    • Martini, B., Choo, K.-K.R., Cloud forensic technical challenges and solutions: A snapshot. IEEE Cloud Comput. 1:4 (2014), 20–25.
    • (2014) IEEE Cloud Comput. , vol.1 , Issue.4 , pp. 20-25
    • Martini, B.1    Choo, K.-K.R.2
  • 25
    • 84958034911 scopus 로고    scopus 로고
    • Android mobile VoIP apps: a survey and examination of their security and privacy
    • Azfar, A., Choo, K.-K.R., Liu, L., Android mobile VoIP apps: a survey and examination of their security and privacy. Electron. Commer. Res. 16:1 (2016), 73–111.
    • (2016) Electron. Commer. Res. , vol.16 , Issue.1 , pp. 73-111
    • Azfar, A.1    Choo, K.-K.R.2    Liu, L.3
  • 28
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev, D., Yao, A.C., On the security of public key protocols. IEEE Trans. Inf. Technol. 29:2 (1983), 198–208.
    • (1983) IEEE Trans. Inf. Technol. , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 29
    • 33845638668 scopus 로고    scopus 로고
    • Refuting security proofs for tripartite key exchange with model checker in planning problem setting
    • Proceedings of the IEEE Computer Security Foundations Workshop, CSFW
    • K.-K.R. Choo, Refuting security proofs for tripartite key exchange with model checker in planning problem setting, in: Proceedings of the IEEE Computer Security Foundations Workshop, CSFW, 2006, pp. 297–308.
    • (2006) , pp. 297-308
    • Choo, K.-K.R.1
  • 30
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Springer-Verlag
    • Bellare, M., Pointcheval, D., Rogaway, P., Authenticated key exchange secure against dictionary attacks. Proceedings of EUROCRYPT LNCS, vol. 1807/2000, 2000, Springer-Verlag, 139–155.
    • (2000) Proceedings of EUROCRYPT, LNCS , vol.vol. 1807/2000 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 32
    • 84949096402 scopus 로고    scopus 로고
    • An adversary model to evaluate DRM protection of video contents on OS devices
    • D'Orazio, C., Choo, K.-K.R., An adversary model to evaluate DRM protection of video contents on OS devices. Comput. Secur. 56C (2016), 94–110.
    • (2016) Comput. Secur. , vol.56C , pp. 94-110
    • D'Orazio, C.1    Choo, K.-K.R.2
  • 33
    • 85035049584 scopus 로고    scopus 로고
    • Apple, How to delete an app that has a configuration profile on your iPhone, iPad, or iPod touch, viewed 14 June, 2015
    • Apple, How to delete an app that has a configuration profile on your iPhone, iPad, or iPod touch, 2015, viewed 14 June 2016. https://support.apple.com/en-au/HT205347.
    • (2016)
  • 36
    • 84994744881 scopus 로고    scopus 로고
    • A technique to circumvent SSL/TLS validations on iOS devices
    • in press.
    • D'Orazio, C.J., Choo, K.-K.R., A technique to circumvent SSL/TLS validations on iOS devices. Future Gener. Comput. Syst., 2016 in press. http://dx.doi.org/10.1016/j.future.2016.08.019.
    • (2016) Future Gener. Comput. Syst.
    • D'Orazio, C.J.1    Choo, K.-K.R.2
  • 37
    • 84961351749 scopus 로고    scopus 로고
    • Malicious sequential pattern mining for automatic malware detection
    • Fan, Y., Ye, Y., Chen, L., Malicious sequential pattern mining for automatic malware detection. Expert Syst. Appl. 52 (2016), 16–25, 10.1016/j.eswa.2016.01.002.
    • (2016) Expert Syst. Appl. , vol.52 , pp. 16-25
    • Fan, Y.1    Ye, Y.2    Chen, L.3
  • 38
    • 84975230776 scopus 로고    scopus 로고
    • A probabilistic discriminative model for android malware detection with decompiled source code
    • Cen, L., Gates, C.S., Si, L., Li, N., A probabilistic discriminative model for android malware detection with decompiled source code. IEEE Trans. Dependable Secure Comput. 12:4 (2015), 400–412.
    • (2015) IEEE Trans. Dependable Secure Comput. , vol.12 , Issue.4 , pp. 400-412
    • Cen, L.1    Gates, C.S.2    Si, L.3    Li, N.4
  • 39
    • 85035013857 scopus 로고    scopus 로고
    • IOS Application Security Testing Cheat Sheet, 11 January, OWASP, viewed 10 June, 2016
    • O. Cornea, J. Haddix, IOS Application Security Testing Cheat Sheet, 11 January, OWASP, 2016, viewed 10 June 2016. https://www.owasp.org/index.php/IOS_Application_Security_Testing_Cheat_Sheet.
    • (2016)
    • Cornea, O.1    Haddix, J.2
  • 40
    • 85035031432 scopus 로고    scopus 로고
    • Arxan, Arxan's Code Obfuscation, viewed 20 June.
    • Arxan, Arxan's Code Obfuscation, 2016, viewed 20 June, 2016. https://www.arxan.com/products/obfuscation.
    • (2016)
  • 41
    • 84919570761 scopus 로고    scopus 로고
    • Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
    • Imgraben, J., Engelbrecht, A., Choo, K.-K.R., Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behav. Inf. Technol. 33:12 (2014), 1347–1360.
    • (2014) Behav. Inf. Technol. , vol.33 , Issue.12 , pp. 1347-1360
    • Imgraben, J.1    Engelbrecht, A.2    Choo, K.-K.R.3
  • 42
    • 85035076931 scopus 로고    scopus 로고
    • ZDnet, Apple iPhone, iPad iOS 9 security flaw lets malicious apps sneak onto enterprise devices, viewed 14 June, 2016
    • ZDnet, Apple iPhone, iPad iOS 9 security flaw lets malicious apps sneak onto enterprise devices, 2016, viewed 14 June 2016. http://www.zdnet.com/article/apple-iphone-ipad-ios-9-security-flaw-lets-malicious-apps-sneak-onto-enterprise-devices/.
    • (2016)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.