Android encryption systems
Title | Android encryption systems |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Teufl, P., Fitzek, A., Hein, D., Marsalek, A., Oprisnik, A., Zefferer, T. |
Conference Name | Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on |
Date Published | May |
Keywords | Android (operating system), Android encryption systems, Android platform deployment analysis, Androids, Apple, attack susceptibility, Blackerry, consumer-oriented devices, cryptography, data protection, device backups, Encryption, Google, Humanoid robots, ios, Microsoft, mobile device sector, mobile devices, nonconsumer area, platform-selection process, RIM, security features, security-critical application scenarios, security-critical context, security-critical environments, smart phones, tablets |
Abstract | The high usability of smartphones and tablets is embraced by consumers as well as the corporate and public sector. However, especially in the non-consumer area the factor security plays a decisive role for the platform-selection process. All of the current companies within the mobile device sector added a wide range of security features to the initially consumer-oriented devices (Apple, Google, Microsoft), or have dealt with security as a core feature from the beginning (RIM, now Blackerry). One of the key security features for protecting data on the device or in device backups are encryption systems, which are available in the majority of current devices. However, even under the assumption that the systems are implemented correctly, there is a wide range of parameters, specific use cases, and weaknesses that need to be considered when deploying mobile devices in security-critical environments. As the second part in a series of papers (the first part was on iOS), this work analyzes the deployment of the Android platform and the usage of its encryption systems within a security-critical context. For this purpose, Android's different encryption systems are assessed and their susceptibility to different attacks is analyzed in detail. Based on these results a workflow is presented, which supports deployment of the Android platform and usage of its encryption systems within security-critical application scenarios. |
URL | http://ieeexplore.ieee.org/document/6970599/ |
DOI | 10.1109/PRISMS.2014.6970599 |
Citation Key | 6970599 |
- Humanoid robots
- tablets
- smart phones
- security-critical environments
- security-critical context
- security-critical application scenarios
- security features
- RIM
- platform-selection process
- nonconsumer area
- mobile devices
- mobile device sector
- Microsoft
- ios
- Android (operating system)
- encryption
- device backups
- Data protection
- Cryptography
- consumer-oriented devices
- Blackerry
- attack susceptibility
- Apple
- Androids
- Android platform deployment analysis
- Android encryption systems