The Inquirer-Home

Apple offers a rare glimpse of its IOS security

Company takes to the stage for the first time at the annual Black Hat conference
Fri Jul 27 2012, 16:12
Apple iPhone 4S

GADGET DESIGNER Apple gave atendees at the Black Hat conference in Las Vegas a peek at its security practices, just hours before it acquired security firm Authentec.

Speaking to a near-capacity crowd, Apple platform security team manager Dallas De Atley described how IOS relies on a complex set of hardware encryption and access keys to prevent malware from accessing the core components of the company's mobile operating system.

Though the security of IOS has been largely credited to Apple's strict control of the App Store service, De Atley noted that the operating system itself employs strict built-in security protections.

"When we were developing the phone we realised there were a number of aspects about the device that made it different from computers at the time," De Atley said.

"Security is an architecture, you have to build it from the beginning."

De Atley described how the company builds security checks into IOS from the kernel itself, running a series of checks before the device activates the display and other hardware components, then runs additional checks before loading other software components.

By doing so, IOS devices are able to check for possible issues in the firmware and operating system and allow the device to activate recovery alerts and procedures should key components of the device incur damage.

The checks and imprints are extended to system updates as well. Every software update includes a check with Apple to verify firmware and personalise the installation for each device, effictively preventing an attacker from downgrading a device to an older, more vulnerable firmware version.

Apple has also made encryption a central component to its security approach. By using hardware-based encryption, the company claimed it is able to save battery life and reduce processor load, while also laying the foundation for a complex series of checks and access keys.

User data is stored on a separate, encrypted partition on the hardware, and accessing various files requires the use of access keys that are tied to another series of master keys. Depending on pre-set permissions, the access keys are able to access various files and components based on conditions such as whether the device is awake or whether the user has entered their access code.

Even the access code itself has been designed for security. De Atley noted that the company employed techniques such as an 80 millisecond delay when entering keystrokes and an escalating delay time between attempts to thwart brute force crack attempts.

"If you have got a passcode that is six charactors and alphanumeric, it is going to take 5.5 years to attempt every single combination," De Atley said.

The presentation came as Apple prepares to unveil the next version of IOS. The IOS 6 update is due to arrive this fall and will likely accompany a new Iphone model. µ

 

Share this:

blog comments powered by Disqus
Advertisement
Subscribe to INQ newsletters

Sign up for INQbot – a weekly roundup of the best from the INQ

Advertisement
INQ Poll

Microsoft's Windows 10 Preview has permission to watch your every move

Does Microsoft have the right to keylog users of its Windows 10 Technical Preview?