Sunteți pe pagina 1din 4

2013 8th International Conference on Information Technology in Asia (CITA)

Comparison Between Android and iOS Operating


System in terms of Security
Mohd Shahdi Ahmad, Nur Emyra Musa, Rathidevi Nadarajah, Rosilah Hassan and Nor Effendy Othman,
School of Computer Science,
Faculty of Information Science & Technology,
Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor, Malaysia
shahdiahmad@yahoo.com, aryme_87@yahoo.com, ratz_devi_87@yahoo.com, rhassan@ieee.org and effendy@ftsm.ukm.my

Abstract— This paper compares between android and iPhone layers which are Core OS layer, Core Services Layer, Media
Operating System (iOS) mobile operating systems (MOS) that Layer and Cocoa touch layer. Core OS layer is the bottom
available in the market which is more specific on the security layer of the iOS stack and sit directly on the hardware. This
issue. These issues are reportedly the concern of not only the layer provides a range of services including low-level network
mobile customers but also the software developers. In achieving
access to external accessories and common operating system
security requirements, the MOS developers need to know how to
achieve the criteria. The security requirements for MOS are services such as memory management policy, and thread
Application Sandboxing, Memory Randomization, Encryption, handling file system. The iOS Core Services layer provides
Data Storage Format and Built-in Antivirus. Application the foundation on which many previous layers referenced
sandboxing enforces permissions, privileges, directories, constructed and consists of the following framework. Media
entitlements and kernel access for a mobile app. Memory layer contains the graphics, audio, video and technology
randomization ensures that the memory regions of mobile geared towards creating the best multimedia experience
application as well as system shared libraries are all randomized available on a mobile device. Technology in this layer has
at device and application start-up. Encryption is performed on been designed to make it easy for you to build applications
disk or filer/folder level and also at the interprocess that look and sound great. The Cocoa Touch layer provides the
communication level. It is difficult to speak in favor or against
the android or the iOS operating system in terms of better
key framework for building iOS applications. This layer
security. The way of using the device plays a major role in defines the basic application infrastructure and support for key
determining the security level. In terms of storage, all data are technologies such as multitasking, touch-based input, push
stored in Data Storage Format. Data can be stored at internal notifications, and many high-level system services. Some of
storage or external storage. To protect the MOS from virus the application can be freely downloaded. For iOS application
attacks, antivirus need to be installed for increasing security cannot directly communicate with other apps. Why we need
areas. security on MOS is to ensure all the user credential is not
attacked, to make sure sensitive data is not exposed to outsider
Keywords—MOS; Android; iOS; and to understand, prevent, rectify and remove viruses.
The rest of the paper organizes as: section II describes the
I. INTRODUCTION security requirement for mobile OS such as the Application
Mobile OS is also known as Mobile Operating System Sandboxing, Memory Randomization, Encryption, Data
(MOS) whereas its use of handheld operating system. It’s also Storage Format and Built-In Antivirus. Section III presents the
known as a software platform for mobile devices which is comparison of security in mobile OS and the conclusion of the
allowed mobile devices to run the application and program. paper.
This MOS combine features of a personal computer operating
system and manage all hardware and optimizes the efficacy. II. SECURITY REQUIREMENT FOR MOBILE OS
There are several types of mobile OS in the market. The two
famous mobile OS nowadays is Android and iPhone A. Application Sandboxing
Operating System (iOS). Android OS is an open source and
The process of application sandboxing requires declarative
source code release by Google under the Apache license. The
permissions or entitlements. These declarations are defined in
operating system is a linux based and the application software
the manifest of the mobile app. When a mobile app is created,
running on an application framework which includes Java-
the permissions or entitlements set are assigned. And once
compatible [12] libraries based on Apache Harmony. This
they are assigned, they will not be dynamically changed at
android designed primarily for touch screen mobile devices
runtime by the mobile app, or the mobile OS kernel [4]. This
and the user interface is based on direct manipulation using
determines the resources that can be shared. And those limits
the touch screen. The first Android phone sold in October
will never extend beyond the definite declaration set at startup.
2008 and the latest version is jelly bean android 4.2. iOS
This is the layer of protection that today’s mobile OS provide.
derived from OS X that share by Darwin foundation. This iOS
For mobile operating system, application sandboxing have
mainly use for apple product such as iPhone and iPad [8].
been applied to improve the security of the mobile.
There are 4 abstraction
Application sandboxing is a container used to control and limit
the application from accessing to the system or other

978-1-4799-1092-2/13/$31.00 ©2013 IEEE


2013 8th International Conference on Information Technology in Asia (CITA)

application especially the malicious code and virus. operating system because it provides additional protection in
Sandboxing will assign a unique ID for each application and case your mobile is stolen.
run it as the users which run in a separate process. This is Encryption is a new security method introduced in
important to reduce damage by the malicious because it is Android. There is no device encryption on Android version <
isolated from the other application. 3.0. First encryption method for Android operating system is
For Android, the application sandboxing is based on the device encryption API which was released in “Ice Cream
linux kernel platform [14]. It is a complex and robust sandbox Sandwich 4.0”. Encryption is based on dm-encrypt (disk
model. Application sandboxing in Android is controlled by encryption) for Android operating system. You must have
each application and required permission and approval to encryption pin or password [13] to read the encrypted file in
continue accessing what the application needed. This will Android [9].
improve and build the security tighter. Each application has its Encryption is also a new security method in iOS too.
own sandbox directory and the permission is per application. Hardware encryption was introduced with the IPhone 3GS.
For iOS, the application sandboxing has been defined by Encryptions secure all our data in an Apple product.
Apple as a set of fine-grained control that limits the Encryption allows remote wipe by removing the encryption
application access to the file system, network and hardware. key for the device. Once the hardware key is removed, the
iOS also has a robust sandbox model where all applications device is useless for iOS operating system mobile devices.
shared a same sandbox model which is more secure and less Full MDM API’s available in iOS [7]. You must have
open to the crowd. passcode to read the encrypted file in iOS.
iOS is much better and more secured since it is only Apple iOS device protection API is more robust than
allowed users to access the system file in the root and the Android. While designing the developers does not take
settings of the phone not in each application. But Android advantage of the encryption method although both Android
relies more on user because it required user to set the security and iOS operating system supports the storage of secrets in the
for each application during installation time. ciphertext mode on disks. All encrypted data can be stored in
the form of plain text but cannot be accessed by the developers
without knowing the encryption codes.
B. Memory Randomization
Other security features are memory randomization or D. Data Storage Format
Address Space Layout Randomization (ASLR) [2]. Memory Data storage is a place where all the data is stored either in
randomization is a process where the memory application, a built in storage or external storage. Normally, a mobile
shared library and others in a device is located randomly. This device will have both built in storage and also external storage
is important to avoid the malicious code or virus to attack the to keep all the data [6]. If storing sensitive data on a device,
memory of the running application. Malicious code or virus you need to make sure that the storage itself is secured and
need to find the exact position or memory region of the task it protected [10].
wants to attack and this is complicated for them since it have For Android, the storage of data can be stored in both data
been randomly located. Even with the existence of ASLR, storage which is external and internal built in. External storage
developers must take care that we extend to apply defensive in Android such as SD card does not have permission and by
programming techniques, such as preventing buffer overflow default all the application has read access to the storage and
and other memory corruption that may occur. can read all files. Android implements standard crypto
For Android operating system, memory randomization is libraries to secure the storage but this method only act as
fully applied to Jelly Bean release. For iOS, memory password policy. With root access, it is easy for any unwanted
randomization has been applied since iOS 4.3 earlier than the code to find the encryption keys in the memory. An
Android operating system. It also added more secured application in Android can access all the files throughout the
technology where iOS has code signing technology which is a device without any restriction thus can spread the malware
process required to allow unauthorized applications running in directly to the storage.
a device. While in the iOS, the devices itself do not have an external
Code signing technology [1] is a process where new third storage or memory. It only has a built in storage which
party applications need to be validated and signed using an requires permission to manipulate or access all the data. The
Apple issued certificate. It is a mandatory process to make Data Protection APIs built into iOS, combined with a complex
sure the OS is keep trusted to the new apps. It also important passphrase can provide an additional layer of data protection.
to prevents the third party application from loading unsigned So iOS storage will be more secure than Android and make
code resources or using self-modifying code. the application difficult to access the data in the data storage.
By right, iOS is more secured compared to the Android
operating system because memory randomization in iOS is E. Built-in Antivirus
enhanced by the code signing technology.
In general there are 3 types of popular malware that affects
C. Encryption mobile such as Virus, Spyware and Trojan [11]. A Virus is a
true piece of malicious software. The Virus is usually
Encryption is translation of data into a secret code.
transmitted through email. Spyware is software that gathers
Encryption is also the most effective method to archive data
information about users without their knowledge. Meanwhile
security. You must have access to a secret key or password
Trojan serves a desirable function but actually the purpose of
that enable you decrypt a data which is in an encrypted file.
the Trojan is malicious. Both Android and iOS mobile was
Unencrypted data is called as plain text and Encrypted data is
introduced with built-in antivirus features to avoid malware
called as cipher text. Encryption is important for mobile
2013 8th International Conference on Information Technology in Asia (CITA)

such as viruses, spyware and Trojan from affecting our mobile Mobile security is all about trade-offs and manage the
operating system. risk. It's about how developers can reduce and minimize
Android mobile does not have a vigorous vetting process. potential risks for consumers. The mobile user must also make
Android users can install thousands of applications from a choice between comfort and privacy of data.
Google Play safely. The antivirus features weren’t actually In conclusion, we agreed that iOS are more advantage
found on Android devices but actually found in Google Play compared to Android operating System in term of security
[3]. This means the apps downloaded from outside web source based on comparison that have made. However, there are few
beside Google Play is very risky. The outside source is much basic security points to keep our data safe on the respective
easier for malicious applications to turn the developed mobile device are:
software into a virus. The Android operating system will
prompt a window to allow downloading some applications  Always update your Smartphone OS, irrespective of it
from untrusted web. Once permission is given, some being an Android or an iOS, whenever any application
application will download viruses into the Android operating patches or OS upgrades are released.
system. The extra antivirus solution needs to be installed in the  If the device is being used by a stranger, use a Passcode to
Android operating system to avoid popular malware affects lock your device in order to avoid data leakage. 
our mobile operating system [5] .  Do not jail-break, root, or modify the OS files. 
iOS is Apple’s mobile operating system developed by  Install an antivirus and firewall software to detect and
Apple. Apple has done additional design work to enhance stop any infection.
security without comprising usability. Apple does not need  Install device-tracking applications to find the phone
anti-virus program for iOS because it does not leave room for whenever it is lost or stolen.
viruses to get into the system. The only place to get apps  Regularly backup or synchronize your settings and other
download is from the App store. Apple does not allow personal information in order to avoid the loss of data due
installation from an outside source. Everything through the to theft.
Apps Store is rigorously checked to make sure it does not  Try to learn about the application’s reputation before
contain malicious codes. installing it.
The iOS operating system is less likely to virus attacks  Control the types of data that can be accessed via mobile
than the Android operating system. Apple iOS has put forth devices in order to determine your exposure should a
authentication procedures to ensure safety for its users. As an
device be compromised.
open source and social network, Android is more prone to
virus attached and other security threats.  Don't let arbitrary third-party applications run on your
device platforms; these applications are a go-to tool for
III. CONCLUSION hackers.
 Utilize Mobile Device Management software to create an
Below are the comparison between iOS and android based encrypted password-protected sandbox for sensitive data
on its security features shown in TABLE 1.
and enforce device-side technical policies.

TABLE 1
ACKNOWLEDGMENT
COMPARISON OF SECURITY IN MOBILE OS
We would like to acknowledge this paper is a part of a
Comparison of Security in Mobile OS Computer Networking group from Faculty of Information
Features
Android iOS Science and Technology, UKM. This research has been
Application Each app has it All apps shared same conducted in the Network and Communication Technology
Sandboxing own sandbox sandbox (NCT) lab. For further information can visit our website at
Fully applied in Jelly Already applied in
Bean Release, later 4.3 releases. Added
www.ftsm.ukm.my/network. We also would like to thank to
Memory
randomization than iOS. No code with code signing Prof Madya Dr Rosilah Hassan and Mr Nor Effendy which
signing technology technology involve to accomplish this study.
Encryption Disk encryption Hardware encryption
REFERENCES
Data Storage Have an external No external storage
Format storage and can be and difficult for the
accessible by unwanted code to [1] Rosilah Hassan, Muhammad Syahrin Ab. Rahman, Mohd Rosmadi
unwanted code access built in storage Mokhtar, Aini Aman, Mobile Accounting Version 1 Design of Mobile
Costing Application for MSMEs Using Android, IEEE ICACT 2013,
Built in Antivirus can be PyongChang Korea Jan 27-30, 2013, pp.697-701.
downloaded from the
[2] http://www.rdacorp.com/2012/08/mobile-application-
Android market. More development-security/
easy for virus attack No antivirus is
required since there is [3] https://community.rapid7.com/community/mobilisafe/blog/2012/12/21/
since no protection and checking been done in inside-the-sandbox
checking is done the Apps Store. [4] http://source.android.com/tech/security/
before outside web
source application [5] http://www.howtogeek.com/129896/htg-explains-does-your-android-
phone-need-an-antivirus/
been downloaded
[6] https://developer.android.com/training/articles/security-tips.html
[7] http://www.apple.com/ipad/business/it-center/deployment-
mdm.html
2013 8th International Conference on Information Technology in Asia (CITA)

[8] "Apple - iPhone 4S - The most amazing iPhone yet." [Online].


Available: http://www.apple.com/iphone/.
[9] "Symantec: Finders Will Try to Access Lost Smartphones -
Security - News & Reviews - eWeek.com - eWeek Mobile."
[Online].Available:
http://mobile.eweek.com/c/a/Security/Symantec-Finders-Will-
Try-to-Access-Lost- Smartphones-350586/.
[10] Tae Oh; Stackpole, B.; Cummins, E.; Gonzalez, C.; Ramachandran, R.;
Shinyoung Lim, "Best security practices for android, blackberry, and
iOS," Enabling Technologies for Smartphone and Internet of Things
(ETSIoT), 2012 First IEEE Workshop on , vol., no., pp.42,47, 18-18
June 2012
[11] Qing Li; Clark, G., "Mobile Security: A Look Ahead," Security &
Privacy, IEEE , vol.11, no.1, pp.78,81, Jan.-Feb. 2013 doi:
10.1109/MSP.2013.15
[12] Khadijah Wan Mohd Ghazali, Rosilah Hassan and Zulkarnain Md Ali, A
Network Device Simulator, IEEE ICACT 2013, PyongChang Korea Jan
27-30, 2013, pp.378-381.
[13] A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, "Smudge
attacks on smartphone touch screens," Berkeley, CA, USA, 2010, pp. 1-
7.
[14] Prince McLean.Inside google’s Android and Apple’s iPhone OS as
business models.roughlyDrafted Magazine.November 10,2009.

S-ar putea să vă placă și