Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions

05/26/2021
by   Maximilian Zinkus, et al.
0

In this work we present definitive evidence, analysis, and (where needed) speculation to answer the questions, (1) Which concrete security measures in mobile devices meaningfully prevent unauthorized access to user data? (2) In what ways are modern mobile devices accessed by unauthorized parties? (3) How can we improve modern mobile devices to prevent unauthorized access? We examine the two major platforms in the mobile space, iOS and Android, and for each we provide a thorough investigation of existing and historical security features, evidence-based discussion of known security bypass techniques, and concrete recommendations for remediation. We then aggregate and analyze public records, documentation, articles, and blog postings to categorize and discuss unauthorized bypass of security features by hackers and law enforcement alike. We provide in-depth analysis of the data potentially accessed via law enforcement methodologies from both mobile devices and associated cloud services. Our fact-gathering and analysis allow us to make a number of recommendations for improving data security on these devices. The mitigations we propose can be largely summarized as increasing coverage of sensitive data via strong encryption, but we detail various challenges and approaches towards this goal and others. It is our hope that this work stimulates mobile device development and research towards security and privacy, provides a unique reference of information, and acts as an evidence-based argument for the importance of reliable encryption to privacy, which we believe is both a human right and integral to a functioning democracy.

READ FULL TEXT

page 26

page 28

page 31

page 32

page 34

page 38

page 40

page 41

research
09/22/2021

SoK: Cryptographic Confidentiality of Data on Mobile Devices

Mobile devices have become an indispensable component of modern life. Th...
research
01/23/2018

Towards Understanding Connections between Security/Privacy Attitudes and Unlock Authentication

In this study, we examine the ways in which user attitudes towards priva...
research
08/01/2023

A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery

Digital rights management (DRM) solutions aim to prevent the copying or ...
research
12/11/2019

Judge, Jury Encryptioner: Exceptional Access with a Fixed Social Cost

We present Judge, Jury and Encryptioner (JJE) an exceptional access sche...
research
12/02/2021

Principles for new ASI Safety Paradigms

Artificial Superintelligence (ASI) that is invulnerable, immortal, irrep...
research
07/16/2023

CAPTCHA Types and Breaking Techniques: Design Issues, Challenges, and Future Research Directions

The proliferation of the Internet and mobile devices has resulted in mal...

Please sign up or login with your details

Forgot password? Click here to reset