Preview

Iphone Keychain Faq

Satisfactory Essays
Open Document
Open Document
4396 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Iphone Keychain Faq
iOS Keychain Weakness FAQ Further Information on iOS Password Protection
Jens Heider, Rachid El Khayari Fraunhofer Institute for Secure Information Technology (SIT) December 5, 2012

Updated versions can be found at: http://sit4.me/ios-keychain-faq

Contact person: Dr. Jens Heider Fraunhofer Institute for Secure Information Technology (SIT) Rheinstraße 75, 64295 Darmstadt, Germany Email: jens.heider@sit.fraunhofer.de Phone: +49 (0) 61 51/869-233

Revision history
1.9 2012-12-05 added: Appendix A Protection Class Overview, p. 15 added iOS 6.0.1 keychain entry classification table updated: 2.1 Which versions of iOS are affected by the attack method?, p. 5 iOS 6.0.1 is affected updated: 2.19 Which devices are in danger?, p. 11 added iPad4, iPad mini and iPhone 5 to the list of currently unaffected devices 1.8 2012-07-16 added: 2.20 Is the SIM PIN affected?, p. 11 SIM PIN can be extracted updated: 2.1 Which versions of iOS are affected by the attack method?, p. 5 iOS 5.1.1 is affected updated: 2.19 Which devices are in danger?, p. 11 added iPad3 to the list of currently unaffected devices updated: Appendix A Protection Class Overview, p. 14 SIM PIN and Bluetooth Link Keys classification added to table updated: Appendix A Protection Class Overview, p. 14 keychain entry classifications updated for iOS 5.1.1 release 1.7 2012-05-10 updated: 2.1 Which versions of iOS are affected by the attack method?, p. 5 iOS 5.1 is affected updated: Appendix A Protection Class Overview, p. 14 keychain entry classifications updated for iOS 5.1 release updated: Matthias Boll left the team and Rachid El Khayari entered as co-author 1.6 2012-02-27 updated: 2.1 Which versions of iOS are affected by the attack method?, p. 5 iOS 5.0.1 is affected updated: 2.3 Are X.509 certificates also affected?, p. 6 certificates in lower class than passwords updated: 2.19 Which devices are in danger?, p. 11 added iPad2 and iPhone 4S, potentially affected via Absinthe jailbreak updated: Appendix A

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Bsa310 Week 2 Team

    • 546 Words
    • 3 Pages

    University of Phoenix. (n.d.). Service Requests Web Links. Academic Materials and Tools. Retrieved from: https://ecampus.phoenix.edu/secure/aapd/cist/libraries/sitemap.htm…

    • 546 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    In this Hi-Tech era, there is a great demand to identify and authenticate the individuals. Till now we are totally dependent upon Passwords and Pin Numbers for identification. How secure are passwords? With the numerous passwords that an individual has to remember, they are often forgotten,…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face various security issues from mobile devices that connect to the network, often unintentionally.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Best Essays

    Android vs IOS

    • 2431 Words
    • 10 Pages

    A mobile operating system is the system used to operate a smartphone, tablet, PDA or other digital mobile devices.…

    • 2431 Words
    • 10 Pages
    Best Essays