ple iCloud solution. Details about the information
stored in iTunes backups can be found on a dedicated
webpage on the previously mentioned iPhone Wiki
6
.
The aspects related to forensics are covered by var-
ious other sources that describe the backup process,
the difference between standard and encrypted back-
ups and the implications for a forensic analysis (In-
fosec Institute, 2012b), (Infosec Institute, 2012a).
3 THREATS AND ASSUMPTIONS
The presented security analysis is based on the sce-
nario that a security officer within the public or private
sector is confronted with the task of deploying the iOS
platform within a security-critical context. Thereby,
mobile devices and the required applications are uti-
lized to process and store security-critical data.
The main threats in relation to mobile device
security are related to the possibility of an attacker
gaining physical access to the device (theft), or
installing malware on the device. The main em-
phasis of this paper is placed on the first threat –
theft. Malware is only considered in the context of
jailbreaking where a piece of software that gains root
access to the device by exploiting a security flaw, is
deliberately installed by the user or attacker.
Theft. The following assumptions for the conducted
analysis are defined within the context of an attacker
stealing a device containing security-critical data.
First, our assessments are based on the assumption
that the iOS encryption systems are implemented
correctly. The goal of this assessment is to analyze
weaknesses located on a higher level, such as miscon-
figurations, weak passwords, limits of key derivation
functions or wrong assumptions in relation to the
encryption scope (e.g., files vs. file-system). Second,
we assume that a passcode-locked iOS device is
stolen by an attacker who is an expert with in-depth
knowledge about the deployed encryption systems
and their weaknesses. This scenario is similar to the
one faced by a forensic expert who needs to analyze
the data stored on an iOS device. In this context we
also assume that the attacker employs jailbreaking
tools. This is the only type of malware
7
that will
be considered in the conducted analysis. Finally,
the analysis is mainly focused on managed devices
that are configured via mobile-device-management
6
http://theiphonewiki.com/wiki/ITunes
Backup
7
Jailbreak software might not be considered as mali-
cous, when deliberately installed by the user. Still, this type
of software needs to exploit a security flaw in order to gain
root access. Therefore, there is a high similarity to malware.
solutions. The rationale behind this assumption is the
security-critical deployment scenario that forms the
basis for this analysis. In such an environment, the
currently popular Bring-Your-Own-Device scenario
can only play a minor role due to the user’s sole
control of the security related device configuration
(setting passcodes, activating/deactivating encryp-
tion systems, backups). In such a scenario, the
developers/administrators cannot rely on platform
security and encryption systems, but must implement
their own protection mechanisms (e.g., container
applications
8
), which typically cannot achieve the
same level of security as it is provided by system
functionality.
Malware. Although malware related attacks with the
exception of jailbreaks are not considered in the re-
mainder of this work, a short overview on the differ-
ent malware categories and their implications are dis-
cussed in this section. Also, the reasons for excluding
these kind of attacks in this analysis are explained.
We refer to malware as a piece of software that
is installed on the user’s device, even if the attacker
does not have physical access to the device. The in-
stallation could either be initiated by the user who in-
tentionally installs an application that contains hidden
malicious code, or by an action that triggers the in-
jection of malicious code via a security flaw in the
device’s operating system or applications. An exam-
ple would be a critical browser vulnerability that is
exploited when the user visits the attacker’s webpage
hosting the exploit code and the malicious payload in-
jected via the security flaw.
We need to differentiate between two types of ma-
licious applications: First, malware that exploits crit-
ical system vulnerabilities to gain root access to the
device, and second, malware that only relies on the
standard platform APIs. This malware could either
extract the protected data from the victim’s phone, or
gain additional information that helps the attacker to
break the encryption systems, when physical access
to the device is gained at a later time.
Unfortunately, when a malicious application of
the first category gains root privileges on the targeted
device, none of the existing encryption systems can
protect the stored data. Malicious code executed with
root privileges can inspect or modify arbitrary aspects
of the device’s operating system and thus in one way
or another gain access to the protected data. Exam-
ples for such attacks would be the deployment of key-
loggers, the extraction of encryption keys from the
8
Such as the solutions by Good Technology and Excitor.
http://www1.good.com/mobility-management-solutions/
bring-your-own-device and http://www.excitor.com
SECRYPT2013-InternationalConferenceonSecurityandCryptography
172