Securing app distribution process of iOS exploiting the notion of authentic update

Sajeda Akter, Farzana Rahman, A. B.M.Alim Al Islam

Research output: Chapter in Book/Entry/PoemConference contribution

1 Scopus citations

Abstract

iOS is, perhaps, considered as one of the most secured and reliable operating systems available now-a-days. However, its loopholes are coming into light in recent times causing a few security breaches such as the Masque attack. Even though prompt and pragmatic fixes for such breaches are of utmost significance, a fix for the Masque attack is yet to be proposed. To address this issue, in this paper, we propose a novel mechanism for guarding against the Masque attack. In our proposed mechanism, we exploit a synergy between authentication and non-repudiation to guard against different forms of Masque attack. Our exploitation leads towards a simple mechanism for preventing Replay attacks and for rejecting unauthenticated update, both of which generally paves the way of performing Masque attack. Consequently, the mechanism offers a pragmatic and easy-to-implement solution for the Masque attack.

Original languageEnglish (US)
Title of host publicationProceedings of 2016 International Conference on Networking Systems and Security, NSysS 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509002030
DOIs
StatePublished - Feb 5 2016
Externally publishedYes
EventInternational Conference on Networking Systems and Security, NSysS 2016 - Dhaka, Bangladesh
Duration: Jan 7 2016Jan 9 2016

Publication series

NameProceedings of 2016 International Conference on Networking Systems and Security, NSysS 2016

Conference

ConferenceInternational Conference on Networking Systems and Security, NSysS 2016
Country/TerritoryBangladesh
CityDhaka
Period1/7/161/9/16

ASJC Scopus subject areas

  • Computer Science Applications
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Securing app distribution process of iOS exploiting the notion of authentic update'. Together they form a unique fingerprint.

Cite this