DocumentCode
168980
Title
Android encryption systems
Author
Teufl, Peter ; Fitzek, Andreas ; Hein, Daniel ; Marsalek, Alexander ; Oprisnik, Alexander ; Zefferer, Thomas
Author_Institution
Inst. for Appl. Inf. Process. & Commun., Graz Univ. of Technol., Graz, Austria
fYear
2014
fDate
11-14 May 2014
Firstpage
1
Lastpage
8
Abstract
The high usability of smartphones and tablets is embraced by consumers as well as the corporate and public sector. However, especially in the non-consumer area the factor security plays a decisive role for the platform-selection process. All of the current companies within the mobile device sector added a wide range of security features to the initially consumer-oriented devices (Apple, Google, Microsoft), or have dealt with security as a core feature from the beginning (RIM, now Blackerry). One of the key security features for protecting data on the device or in device backups are encryption systems, which are available in the majority of current devices. However, even under the assumption that the systems are implemented correctly, there is a wide range of parameters, specific use cases, and weaknesses that need to be considered when deploying mobile devices in security-critical environments. As the second part in a series of papers (the first part was on iOS), this work analyzes the deployment of the Android platform and the usage of its encryption systems within a security-critical context. For this purpose, Android´s different encryption systems are assessed and their susceptibility to different attacks is analyzed in detail. Based on these results a workflow is presented, which supports deployment of the Android platform and usage of its encryption systems within security-critical application scenarios.
Keywords
Android (operating system); cryptography; data protection; smart phones; Android encryption systems; Android platform deployment analysis; Apple; Blackerry; Google; Microsoft; RIM; attack susceptibility; consumer-oriented devices; data protection; device backups; iOS; mobile device sector; mobile devices; nonconsumer area; platform-selection process; security features; security-critical application scenarios; security-critical context; security-critical environments; smart phones; tablets; Androids; Encryption; Humanoid robots; Smart phones;
fLanguage
English
Publisher
ieee
Conference_Titel
Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on
Conference_Location
Aalborg
Print_ISBN
978-1-4799-4630-3
Type
conf
DOI
10.1109/PRISMS.2014.6970599
Filename
6970599
Link To Document