Researchers from the Infocomm Security Department at A*STAR’s Institute for Infocomm Research (I2R) and Singapore Management University’s (SMU) School of Information Systems have identified three proof-of-concept attacks which can be performed by third-party applications to threaten the security of the iOS platform.
The attacks, which include pass-code cracking, interference with or control of telephony functionality and sending tweets without the user’s awareness and permission, have been rectified by Apple Inc in its latest operating system, iOS 7.
Apple’s iOS operating system is one of the most popular mobile operating systems in terms of the number of users. As of January 2013, 500 million iOS devices have been sold worldwide, and Apple’s iTunes App Store has over 800,000 iOS third-party applications with downloads exceeding 40 billion.
Third-party applications are pervasively installed on these iOS devices as they provide various functions that significantly extend the usability of the mobile devices. However, these third-party applications pose potential threats by compromising the personal and business data stored on the devices.
Between June to October 2012, I2R and SMU researchers embarked on a task to unveil a generic attack vector that enables third-party applications to launch attacks on non-jailbroken iOS devices. The research team constructed multiple proof-of-concept attacks such as cracking the device PIN, blocking incoming calls and posting unauthorised tweets. To overcome these security breaches, the team proposed several mitigation methods to enhance the vetting process and the iOS application sandbox. Apple Inc. was notified of these security vulnerabilities and rectified them for the launch of iOS 7, acknowledging I2R’s and SMU’s contributions. Please see Appendix A for full information on the three security fixes developed by the I2R and SMU research team in iOS 7.
Dr Tan Geok Leng, Executive Director of the Institute for Infocomm Research (I2R) said, “I2R’s expertise in the infocomm security arena has once again been harnessed to benefit the mobile community. We are proud of our researchers’ efforts in boosting the security of Apple’s latest operating system – the iOS 7. The enhanced data protection, secured telephony functionality and protected Twitter functionality will let iOS end users utilise their mobile devices for leisure or work with a peace of mind.”
SMU’s Vice Provost of Research and Dean of the School of Information Systems Professor Steven Miller, said “Information security is a core area of research at the SMU School of Information Systems. Our research team not only aims to create impact in the research community, but also in the wider community. I am pleased to note that our researchers have been able to leverage our expertise and technologies to enhance security in cyberspace, and in this case help strengthen the security of the iOS platform to protect the security and privacy of businesses and individuals.”
For more information, please contact:Ms. Doris Yang
The School possesses deep research R&D capability in four strategically-selected areas of IS technology: Information Security & Data Privacy; Data Management & Analytics; Intelligent Systems & Decision Analytics; and Software Systems. The fifth strategic area of the School is Information Systems & Management, where the faculty investigate the managerial aspects and business impact of IT in public and private sector organisations, and across value chains, markets and industries. Since its inception, SIS has established a strategic partnership with Carnegie Mellon. Through SIS, SMU and Carnegie Mellon launched the Living Analytics Research Centre (www.larc.smu.edu.sg) in 2011. More information on SIS can be found at: www.sis.smu.edu.sg
Researchers involved: Jin Han of the Institute for Infocomm Research working with Qiang Yan and Su Mon Kywe of Singapore Management University2. Telephony
Researchers involved: Jin Han of the Institute for Infocomm Research working with Qiang Yan and Su Mon Kywe of Singapore Management University; Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee from the Georgia Institute of Technology3. Twitter
Researchers involved: Jin Han of the Institute for Infocomm Research working with Qiang Yan and Su Mon Kywe of Singapore Management University; Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee from the Georgia Institute of Technology
New software speeds origami structure designs
12.10.2017 | Georgia Institute of Technology
Seeing the next dimension of computer chips
11.10.2017 | Osaka University
Material defects in end products can quickly result in failures in many areas of industry, and have a massive impact on the safe use of their products. This is why, in the field of quality assurance, intelligent, nondestructive sensor systems play a key role. They allow testing components and parts in a rapid and cost-efficient manner without destroying the actual product or changing its surface. Experts from the Fraunhofer IZFP in Saarbrücken will be presenting two exhibits at the Blechexpo in Stuttgart from 7–10 November 2017 that allow fast, reliable, and automated characterization of materials and detection of defects (Hall 5, Booth 5306).
When quality testing uses time-consuming destructive test methods, it can result in enormous costs due to damaging or destroying the products. And given that...
Using a new cooling technique MPQ scientists succeed at observing collisions in a dense beam of cold and slow dipolar molecules.
How do chemical reactions proceed at extremely low temperatures? The answer requires the investigation of molecular samples that are cold, dense, and slow at...
Scientists from the Max Planck Institute of Quantum Optics, using high precision laser spectroscopy of atomic hydrogen, confirm the surprisingly small value of the proton radius determined from muonic hydrogen.
It was one of the breakthroughs of the year 2010: Laser spectroscopy of muonic hydrogen resulted in a value for the proton charge radius that was significantly...
It's possible to produce hydrogen to power fuel cells by extracting the gas from seawater, but the electricity required to do it makes the process costly. UCF...
Mercury, our smallest planetary neighbor, has very little to call an atmosphere, but it does have a strange weather pattern: morning micro-meteor showers.
Recent modeling along with previously published results from NASA's MESSENGER spacecraft -- short for Mercury Surface, Space Environment, Geochemistry and...
10.10.2017 | Event News
10.10.2017 | Event News
28.09.2017 | Event News
16.10.2017 | Physics and Astronomy
16.10.2017 | Earth Sciences
16.10.2017 | Physics and Astronomy