SECURITY ANALYSIS OF SIGNAL ANDROID DATABASE PROTECTION MECHANISMS

被引:0
|
作者
Kaczynski, Kamil [1 ]
机构
[1] Mil Univ Technol, Fac Cybernet, Inst Math & Cryptol, Warsaw, Poland
关键词
Signal; cryptography; Android; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signal is an instant messenger recognized by the international community as one of the most secure among other competitors. Signal apps for iOS, Android, and desktop have a protection mechanism for locally stored data - the encryption of the internal database. This paper presents the methods of recovering the encryption key protecting the Android app database, its storage locations, and threats to the users resulting from it. Recommendations for the software authors that allow improving the overall security of the solution and removing already-found vulnerabilities were also discussed here.
引用
收藏
页码:63 / 70
页数:8
相关论文
共 50 条
  • [31] AndroidProtect: Android Apps Security Analysis System
    Zhang, Tong
    Li, Tao
    Wang, Hao
    Xiao, Zhijie
    COLLABORATE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2016, 2017, 201 : 583 - 594
  • [32] Security Analysis of Mobile Money Applications on Android
    Darvish, Hesham
    Husain, Mohammad
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 3072 - 3078
  • [33] Research on Security Protection Mechanisms of Digital Content
    Gu, Jinjie
    Cheng, Yuzhu
    PROCEEDINGS 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, (ICCSIT 2010), VOL 1, 2010, : 155 - 158
  • [34] Data security mechanisms implemented in the database with universal model
    V. M. Grachev
    V. I. Esin
    N. G. Polukhina
    S. G. Rassomakhin
    Bulletin of the Lebedev Physics Institute, 2014, 41 : 123 - 126
  • [35] Risk Analysis and Safety Protection of Android Phone
    Wang, Haiyan
    Deng, Yanqing
    Zhang, Ping
    PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 1411 - 1415
  • [36] Data Security Mechanisms Implemented in the Database with Universal Model
    Grachev, V. M.
    Esin, V. I.
    Polukhina, N. G.
    Rassomakhin, S. G.
    BULLETIN OF THE LEBEDEV PHYSICS INSTITUTE, 2014, 41 (05) : 123 - 126
  • [37] BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals
    Xu, Fenghao
    Diao, Wenrui
    Li, Zhou
    Chen, Jiongyi
    Zhang, Kehuan
    26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
  • [38] Research on Protection for the Database Security Based on the Cloud of Smart Grid
    Liu, Donglan
    Zhang, Hao
    Wang, Wenting
    Zhao, Yang
    Zhao, Xiaohong
    Yu, Hao
    Lv, Guodong
    Zhao, Yong
    2019 IEEE 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2019), 2019, : 585 - 589
  • [39] The Analysis on Network Security and Protection
    Jing, Zhou
    INNOVATIVE COMPUTING AND INFORMATION, ICCIC 2011, PT I, 2011, 231 : 66 - 70
  • [40] Analysis and Research on Security Vulnerability Database
    Fang, Jing
    Li, Yifu
    Li, Yingbo
    PROCEEDINGS OF THE 2ND INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2016), 2016, 24 : 145 - 151