Apple details iOS security

By on
Apple details iOS security

The notoriously secretive company has released a security document on iOS.

In a surprising move, Apple has gone public with its iOS security features releasing a detailed guide that highlights the technical specs of its products.

The 18-page document, considered the computing giant's first public address of its security engineering, covers system architecture, encryption, data protection and network security for devices running on iOS, which includes the iPhone, iPad and iPod Touch.

Although a majority of the features discussed in the report have been uncovered by researchers through reverse engineering, one notable topic covered by the document is the multiple security layers implemented into each iOS device.

“The combination of required code signing, sandboxing and entitlements in apps provides solid protection against viruses, malware and other exploits that compromise the security of other platforms,” states the manual.

Additionally, the report includes insight into the mobile operating system's use of address space layout randomization (ASLR), a feature designed to mitigate exploits and stifle saboteurs from corrupting a device's memory with malware.

ASLR was previously assumed to be in use by researchers, but the topic was never publicly discussed by Apple.

“Built-in apps use ASLR to ensure that all memory regions are random­ised upon launch,” the security report stated. "Additionally, system shared library locations are randomized at each device startup."

Although Apple has primarily played its cards close to its chest when it comes to security, the information in the guide could signify a shift in its communication with the public. Charlie Miller, principal research consultant at Accuvant Labs, believes the company may be more concerned with its “acceptance in the enterprise market.”

“[The guide] is located on the enterprise portion of the website,” Miller said in an email to SCMagazine.com.

While the guide is a sign that Apple is coming out of its security shell, Miller says that this shouldn't be seen as a new stance on the topic.

“I've thought that a few times…and have been proven wrong, so from now on I need more convincing before I say that again.”

A spokesperson for Apple was not available for comment.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition
Tags:

Most Read Articles

You must be a registered member of iTnews to post a comment.
| Register

Poll

New Windows 10 users, are you upgrading from...
Windows 8
Windows 7
Windows XP
Another operating system
Windows Vista
How should the costs of Australia's piracy scheme be split?
Rights holders should foot the whole bill
50/50
ISPs should foot the whole bill
Government should chip in a bit
Other
View poll archive

Whitepapers from our sponsors

What will the stadium of the future look like?
What will the stadium of the future look like?
New technology adoption is pushing enterprise networks to breaking point
New technology adoption is pushing enterprise networks to breaking point
Gartner names IBM a 'Leader' for Disaster Recovery as a Service
Gartner names IBM a 'Leader' for Disaster Recovery as a Service
The next era of business continuity: Are you ready for an always-on world?
The next era of business continuity: Are you ready for an always-on world?

Log In

Username:
Password:
|  Forgot your password?