Security Evaluation of IOS and Android

AHMET HAYRAN [1] , MURATCAN İĞDELİ [2] , ATIF YILMAZ [3] , CEMAL GEMCİ [4]


In the race of smartphone operation systems, IOS and Android seem to have the big part of pie. Both platforms have grown more enterprise-friendly since about one decade. Their adaptable functionalities make people' lives easy and give them a reputation in the current competitive technology world. We all have our personal thoughts it comes to features, usability and design. However, what about security? Mobile devices, smartphone operation systems run on, hold valuable, sensitive and classified information or content. So, that increases their attractiveness as targets for cybercriminals. The security of these devices is a growing concern and focus point for smartphone users. Eventually, the security technology of the smartphones becomes one of the prime research and these smartphone vendors have increasingly focused on security in their design efforts. In this paper, factors that influence security within IOS and Android are studied to promote the discussion. Security technologies of IOS and Android are briefly presented. And, varies factors are considered such as methods of application distribution, reduced attack surface, privilege separation, permission-based access control, sandboxing, data encryption, data execution prevention and address space layout randomization, geo-location and auto-erase. Then, brief information is given about malicious apps. Lastly, discussion is concluded to answer that tight question in the light of security models investigation and evidences collected from current life.
mobile security, mobile device, mobile OS, IOS, Android
  • [1] Canalys Report, http://www.canalys.com/newsroom/mobile-device-market-reach-26-billion-units-2016, 2013.
  • [2] Gartner Report Press Release, http://www.gartner.com/newsroom/id/3270418, 2016.
  • [3] Gartner Report Press Release, http://www.gartner.com/newsroom/id/2996817, 2015.
  • [4] Bhattacharya P., Yang L., Guo M., Qian K. and Yang M., Learning Mobile Security with Labware, IEEE Security & Privacy, vol. 12, no. 1, 2014, pp. 69-72.
  • [5] Al-Qershi F., Al-Qurishi M., Md Mizanur Rahman S. and Al-Amri A., Android vs. iOS: The security battle, Computer Applications and Information Systems (WCCAIS), 2014 World Congress on, Hammamet, 2014, pp. 1-8.
  • [6] Mohamed I. and Patel D., Android vs. IOS Security: A Comparative Study, Information Technology - New Generations (ITNG), ), 2015 12th International Conference on, Las Vegas, NV, 2015, pp. 725-730.
  • [7] Li Q. and Clark G., Mobile Security: A Look Ahead, in IEEE Security & Privacy, vol. 11, no. 1, 2013, pp. 78-81.
  • [8] Nachenberg C., A window into mobile device security, Symantec Security Response, Symantec, 2011, pp.4-9.
  • [9] Kazmi Z., Toni F., Vila J. A. and Marcos M. M., TASAM-Towards the Smart Devices App-Stores Applications Security Management Related Best Practices, in New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on, IEEE, 2012, pp. 1-5.
  • [10] Miller C., Blazakis D., DaiZovi D., Esser S. , Lozzo V. and Weinmann R., iOS Hacker's Handbook, John Wiley & Sons, 2012.
  • [11] Luo T. , Jin X., Ananthanarayanan A. and Du W., Touchjacking Attacks on Web in Android, iOS, and Windows Phone?, Syracuse University, Syracuse NY, USA, 2012.
  • [12] IOS Security in Apple Docs, https://www.apple.com/business/docs/iOS_Security_Guide.pdf, 2016.
  • [13] Penning N., Hoffman M., Nikolai J. and Wang Y., Mobile malware security challenges and cloud-based detection, Collaboration Technologies and Systems (CTS), 2014 International Conference on, Minneapolis, MN, 2014, pp. 181-188.
  • [14] Oh, Tae, Stackpole B., Cummins E., Gonzalez C., Ramachandran R. and Lim S., Best security practices for android, blackberry, and iOS, In Enabling Technologies for Smartphone and Internet of Things (ETSloT), 2012 First IEEE Workshop on, IEEE, 2012, pp. 42-47.
  • [15] Internet security threat report 2014, Symantec, http://www.symantec.com/content/en/us/ enterprise/other_resources/b- istr_main_report_v19_21291018.en-us.pdf, 2014.
  • [16] McAfee 3rd Quarter 2013 Threat Report, McAfee, http://malwarelist.net/2013/11/20/mcafee-3rd-quarter-threat-report- released/, 2013.
Subjects Engineering
Journal Section Research Article
Authors

Author: AHMET HAYRAN
Institution: BAŞKENT ÜNİVERSİTESİ
Country: Turkey


Author: MURATCAN İĞDELİ
Institution: BAŞKENT ÜNİVERSİTESİ, SAĞLIK BİLİMLERİ FAKÜLTESİ, FİZYOTERAPİ VE REHABİLİTASYON BÖLÜMÜ, FİZYOTERAPİ VE REHABİLİTASYON PR. (ÜCRETLİ)
Country: Turkey


Author: ATIF YILMAZ
Institution: İHSAN DOĞRAMACI BİLKENT ÜNİVERSİTESİ
Country: Turkey


Author: CEMAL GEMCİ
Institution: BAŞKENT ÜNİVERSİTESİ
Country: Turkey


Dates

Publication Date : December 1, 2016

Bibtex @research article { ijamec270378, journal = {International Journal of Applied Mathematics Electronics and Computers}, issn = {}, eissn = {2147-8228}, address = {}, publisher = {Selcuk University}, year = {2016}, volume = {}, pages = {258 - 261}, doi = {10.18100/ijamec.270378}, title = {Security Evaluation of IOS and Android}, key = {cite}, author = {HAYRAN, AHMET and İĞDELİ, MURATCAN and YILMAZ, ATIF and GEMCİ, CEMAL} }
APA HAYRAN, A , İĞDELİ, M , YILMAZ, A , GEMCİ, C . (2016). Security Evaluation of IOS and Android. International Journal of Applied Mathematics Electronics and Computers , (Special Issue-1) , 258-261 . DOI: 10.18100/ijamec.270378
MLA HAYRAN, A , İĞDELİ, M , YILMAZ, A , GEMCİ, C . "Security Evaluation of IOS and Android". International Journal of Applied Mathematics Electronics and Computers (2016 ): 258-261 <https://dergipark.org.tr/en/pub/ijamec/issue/25619/270378>
Chicago HAYRAN, A , İĞDELİ, M , YILMAZ, A , GEMCİ, C . "Security Evaluation of IOS and Android". International Journal of Applied Mathematics Electronics and Computers (2016 ): 258-261
RIS TY - JOUR T1 - Security Evaluation of IOS and Android AU - AHMET HAYRAN , MURATCAN İĞDELİ , ATIF YILMAZ , CEMAL GEMCİ Y1 - 2016 PY - 2016 N1 - doi: 10.18100/ijamec.270378 DO - 10.18100/ijamec.270378 T2 - International Journal of Applied Mathematics Electronics and Computers JF - Journal JO - JOR SP - 258 EP - 261 VL - IS - Special Issue-1 SN - -2147-8228 M3 - doi: 10.18100/ijamec.270378 UR - https://doi.org/10.18100/ijamec.270378 Y2 - 2016 ER -
EndNote %0 International Journal of Applied Mathematics Electronics and Computers Security Evaluation of IOS and Android %A AHMET HAYRAN , MURATCAN İĞDELİ , ATIF YILMAZ , CEMAL GEMCİ %T Security Evaluation of IOS and Android %D 2016 %J International Journal of Applied Mathematics Electronics and Computers %P -2147-8228 %V %N Special Issue-1 %R doi: 10.18100/ijamec.270378 %U 10.18100/ijamec.270378
ISNAD HAYRAN, AHMET , İĞDELİ, MURATCAN , YILMAZ, ATIF , GEMCİ, CEMAL . "Security Evaluation of IOS and Android". International Journal of Applied Mathematics Electronics and Computers / Special Issue-1 (December 2016): 258-261 . https://doi.org/10.18100/ijamec.270378
AMA HAYRAN A , İĞDELİ M , YILMAZ A , GEMCİ C . Security Evaluation of IOS and Android. International Journal of Applied Mathematics Electronics and Computers. 2016; (Special Issue-1): 258-261.
Vancouver HAYRAN A , İĞDELİ M , YILMAZ A , GEMCİ C . Security Evaluation of IOS and Android. International Journal of Applied Mathematics Electronics and Computers. 2016; (Special Issue-1): 261-258.