Visible to the public Android encryption systems

TitleAndroid encryption systems
Publication TypeConference Paper
Year of Publication2014
AuthorsTeufl, P., Fitzek, A., Hein, D., Marsalek, A., Oprisnik, A., Zefferer, T.
Conference NamePrivacy and Security in Mobile Systems (PRISMS), 2014 International Conference on
Date PublishedMay
KeywordsAndroid (operating system), Android encryption systems, Android platform deployment analysis, Androids, Apple, attack susceptibility, Blackerry, consumer-oriented devices, cryptography, data protection, device backups, Encryption, Google, Humanoid robots, ios, Microsoft, mobile device sector, mobile devices, nonconsumer area, platform-selection process, RIM, security features, security-critical application scenarios, security-critical context, security-critical environments, smart phones, tablets

The high usability of smartphones and tablets is embraced by consumers as well as the corporate and public sector. However, especially in the non-consumer area the factor security plays a decisive role for the platform-selection process. All of the current companies within the mobile device sector added a wide range of security features to the initially consumer-oriented devices (Apple, Google, Microsoft), or have dealt with security as a core feature from the beginning (RIM, now Blackerry). One of the key security features for protecting data on the device or in device backups are encryption systems, which are available in the majority of current devices. However, even under the assumption that the systems are implemented correctly, there is a wide range of parameters, specific use cases, and weaknesses that need to be considered when deploying mobile devices in security-critical environments. As the second part in a series of papers (the first part was on iOS), this work analyzes the deployment of the Android platform and the usage of its encryption systems within a security-critical context. For this purpose, Android's different encryption systems are assessed and their susceptibility to different attacks is analyzed in detail. Based on these results a workflow is presented, which supports deployment of the Android platform and usage of its encryption systems within security-critical application scenarios.

Citation Key6970599