메뉴 건너뛰기




Volumn 4, Issue 2, 2017, Pages 524-535

Data Exfiltration from Internet of Things Devices: IOS Devices as Case Studies

Author keywords

Big data security; Internet of Things (IoT) security; iOS data exfiltration; iOS pairing

Indexed keywords

BIG DATA; IOS (OPERATING SYSTEM); MOBILE SECURITY; PERSONAL COMPUTERS;

EID: 85018406878     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2016.2569094     Document Type: Article
Times cited : (114)

References (40)
  • 6
    • 84981526422 scopus 로고    scopus 로고
    • Apple Accessed on Feb. 1, 2016. [Online]. Available
    • Apple. (2015). iOS Security. Accessed on Feb. 1, 2016. [Online]. Available: https://www.apple.com/business/docs/iOS-Security-Guide.pdf
    • (2015) IOS Security
  • 8
    • 85014660262 scopus 로고    scopus 로고
    • Netmarketshare Accessed on Feb. 1, 2016. [Online]. Available
    • Netmarketshare. (2015). Desktop Operating System Market Share. Accessed on Feb. 1, 2016. [Online]. Available: https://www.netmarketshare.com/operating-system-market-share.aspx
    • (2015) Desktop Operating System Market Share
  • 10
    • 84923675775 scopus 로고    scopus 로고
    • Understanding information hiding in iOS
    • Jan.
    • L. Caviglione and W. Mazurczyk, "Understanding information hiding in iOS, " IEEE Comput., vol. 48, no. 1, pp. 62-65, Jan. 2015.
    • (2015) IEEE Comput. , vol.48 , Issue.1 , pp. 62-65
    • Caviglione, L.1    Mazurczyk, W.2
  • 11
    • 84881124452 scopus 로고    scopus 로고
    • Protect my privacy: Detecting and mitigating privacy leaks on iOS devices using crowdsourcing
    • Y. Agarwal and M. Hall, "ProtectMyPrivacy: Detecting and mitigating privacy leaks on iOS devices using crowdsourcing, " in Proc. Int. Conf. Mobile Syst. Appl. Services, Taipei, Taiwan, 2013, pp. 97-110.
    • (2013) Proc. Int. Conf. Mobile Syst. Appl. Services, Taipei, Taiwan , pp. 97-110
    • Agarwal, Y.1    Hall, M.2
  • 13
    • 77955716041 scopus 로고    scopus 로고
    • Roving bugnet: Distributed surveillance threat and mitigation
    • R. Farley and X. Wang, "Roving bugnet: Distributed surveillance threat and mitigation, " Comput. Security, vol. 29, no. 5, pp. 592-602, 2010.
    • (2010) Comput. Security , vol.29 , Issue.5 , pp. 592-602
    • Farley, R.1    Wang, X.2
  • 21
    • 84912008171 scopus 로고    scopus 로고
    • Exfiltrating data from Android devices
    • Feb.
    • Q. Do, B. Martini, and K.-K. R. Choo, "Exfiltrating data from Android devices, " Comput. Security, vol. 48, pp. 74-91, Feb. 2015.
    • (2015) Comput. Security , vol.48 , pp. 74-91
    • Do, Q.1    Martini, B.2    Choo, K.-K.R.3
  • 22
    • 84905749657 scopus 로고    scopus 로고
    • The visual microphone: Passive recovery of sound from video
    • Jul.
    • A. Davis, et al., "The visual microphone: Passive recovery of sound from video, " ACM Trans. Graph., vol. 33, no. 4, pp. 1-10, Jul. 2014.
    • (2014) ACM Trans. Graph. , vol.33 , Issue.4 , pp. 1-10
    • Davis, A.1
  • 23
    • 84887954672 scopus 로고    scopus 로고
    • On covert acoustical mesh networks in air
    • M. Hanspach and M. Goetz, "On covert acoustical mesh networks in air, " J. Commun., vol. 8, no. 11, pp. 758-767, 2014.
    • (2014) J. Commun. , vol.8 , Issue.11 , pp. 758-767
    • Hanspach, M.1    Goetz, M.2
  • 24
    • 84912019769 scopus 로고    scopus 로고
    • New Scientist, Haywards Heath, U.K. [Online]. Available
    • P. Marks, Hackers Reverse-Engineer NSA's Leaked Bugging Devices, New Scientist, Haywards Heath, U.K., 2014. [Online]. Available: https://www.newscientist.com/article/mg22229744-000-hackers-reverseengineer-nsas-leaked-bugging-devices
    • (2014) Hackers Reverse-Engineer NSA's Leaked Bugging Devices
    • Marks, P.1
  • 26
    • 84898003401 scopus 로고    scopus 로고
    • Identifying back doors, attack points, and surveillance mechanisms in iOS devices
    • J. Zdziarski, "Identifying back doors, attack points, and surveillance mechanisms in iOS devices, " Digit. Invest., vol. 11, no. 1, pp. 3-19, 2014.
    • (2014) Digit. Invest. , vol.11 , Issue.1 , pp. 3-19
    • Zdziarski, J.1
  • 27
  • 28
    • 84961113703 scopus 로고    scopus 로고
    • Lancaster Univ., Security Lancaster Centre, Lancaster, U.K., Tech. Rep.
    • A. Rashid, et al., "Detecting and preventing data exfiltration, " Lancaster Univ., Security Lancaster Centre, Lancaster, U.K., Tech. Rep., 2014.
    • (2014) Detecting and Preventing Data Exfiltration
    • Rashid, A.1
  • 29
    • 84961113703 scopus 로고    scopus 로고
    • Accessed on Feb. 1, 2016. [Online]. Available
    • D. Chismon, M. Ruks, M. Michelini, and A. Waters. (2014). Detecting and Deterring Data Exfiltration. Accessed on Feb. 1, 2016. [Online]. Available: https://www.mwrinfosecurity.com/system/assets/642/original/Detecting-Deterring-Data-Exfiltration-Executive-Briefing-Paper.pdf
    • (2014) Detecting and Deterring Data Exfiltration
    • Chismon, D.1    Ruks, M.2    Michelini, M.3    Waters, A.4
  • 30
    • 85019036455 scopus 로고    scopus 로고
    • McAfee Intel Security, Santa Clara, CA, USA
    • McAfee, Stop Data Exfiltration, Intel Security, Santa Clara, CA, USA, 2015.
    • (2015) Stop Data Exfiltration
  • 32
    • 84867364903 scopus 로고    scopus 로고
    • Addressing security and privacy risks in mobile applications
    • Sep./Oct.
    • A. Jain and D. Shanbhag, "Addressing security and privacy risks in mobile applications, " IT Prof., vol. 14, no. 5, pp. 28-33, Sep./Oct. 2012.
    • (2012) IT Prof. , vol.14 , Issue.5 , pp. 28-33
    • Jain, A.1    Shanbhag, D.2
  • 34
    • 85019049270 scopus 로고    scopus 로고
    • Palo Alto Netw., Santa Clara, CA, USA [Online]. Available
    • C. Xiao, Update: XcodeGhost Attacker Can Phish Passwords and Open URLs Through Infected Apps, Palo Alto Netw., Santa Clara, CA, USA, 2015. [Online]. Available: http://researchcenter.paloaltonetworks.com/2015/09/update-xcodeghost-Attacker-can-phish-passwords-And-open-urlsthough-infected-Apps
    • (2015) Update: XcodeGhost Attacker Can Phish Passwords and Open URLs Through Infected Apps
    • Xiao, C.1
  • 35
    • 84949096402 scopus 로고    scopus 로고
    • An adversary model to evaluate DRM protection of video contents on iOS devices
    • Feb. [Online]. Available
    • C. D'Orazio and K.-K. R. Choo, "An adversary model to evaluate DRM protection of video contents on iOS devices, " Comput. Security, vol. 56, pp. 94-110, Feb. 2016. [Online]. Available: http://dx.doi.org/10.1016/j.cose.2015.06.009
    • (2016) Comput. Security , vol.56 , pp. 94-110
    • D'Orazio, C.1    Choo, K.-K.R.2
  • 37
    • 84919570761 scopus 로고    scopus 로고
    • Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
    • J. Imgraben, A. Engelbrecht, and K.-K. R. Choo, "Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users, " Behav. Inf. Technol., vol. 33, no. 12, pp. 1347-1360, 2014.
    • (2014) Behav. Inf. Technol. , vol.33 , Issue.12 , pp. 1347-1360
    • Imgraben, J.1    Engelbrecht, A.2    Choo, K.-K.R.3
  • 38
    • 84947587045 scopus 로고    scopus 로고
    • A forensically sound adversary model for mobile devices
    • [Online]. Available
    • Q. Do, B. Martini, and K.-K. R. Choo, "A forensically sound adversary model for mobile devices, " PLoS ONE, vol. 10, no. 9, pp. 1-15, 2015. [Online]. Available: http://dx.doi.org/10.1371/journal.pone.0138449
    • (2015) PLoS ONE , vol.10 , Issue.9 , pp. 1-15
    • Do, Q.1    Martini, B.2    Choo, K.-K.R.3
  • 39
    • 84964790214 scopus 로고    scopus 로고
    • Radio access network virtualization for the social Internet of Things
    • Nov./Dec.
    • H. Li, M. Dong, and K. Ota, "Radio access network virtualization for the social Internet of Things, " IEEE Cloud Comput., vol. 2, no. 6, pp. 42-50, Nov./Dec. 2015.
    • (2015) IEEE Cloud Comput. , vol.2 , Issue.6 , pp. 42-50
    • Li, H.1    Dong, M.2    Ota, K.3
  • 40
    • 84939569136 scopus 로고    scopus 로고
    • Securing distributed storage for social Internet of Things using regenerating code and Blom key agreement
    • J. Wu, M. Dong, K. Ota, L. Liang, and Z. Zhou, "Securing distributed storage for social Internet of Things using regenerating code and Blom key agreement, " Peer to Peer Netw. Appl., vol. 8, no. 6, pp. 1133-1142, 2015.
    • (2015) Peer to Peer Netw. Appl. , vol.8 , Issue.6 , pp. 1133-1142
    • Wu, J.1    Dong, M.2    Ota, K.3    Liang, L.4    Zhou, Z.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.