Phone Security
CS 161 Fall 2025 - Lecture 27
Computer Science 161
Outline
2
Computer Science 161
Cryptography History
3
Computer Science 161
World War II
4
Computer Science 161
Analog cellphones
5
Computer Science 161
Digital cellphones
6
Computer Science 161
End-to-end cryptography
7
Computer Science 161
Lawful intercept
8
Computer Science 161
"Greek Watergate"
9
Computer Science 161
Operation Aurora
10
Computer Science 161
Snowden leaks
11
Computer Science 161
12
Computer Science 161
2024 telecommunications hack
13
Computer Science 161
Takeaways
14
Computer Science 161
iPhone Security
15
Computer Science 161
Some interesting aspects of iPhone security
16
Computer Science 161
Encrypted filesystems
17
Computer Science 161
Why encrypt?
18
Computer Science 161
Key management
19
Computer Science 161
Solution
20
Computer Science 161
Design quiz
21
Computer Science 161
Encrypted backups
22
Computer Science 161
Backups are essential
23
Computer Science 161
Design quiz
24
Computer Science 161
Design quiz #2
25
Computer Science 161
Solution
26
Computer Science 161
End-to-end encryption for iMessage
27
Computer Science 161
Design quiz
28
Computer Science 161
Apple's solution
29
Computer Science 161
App-oriented security
30
Computer Science 161
Multi-user vs multi-app
31
Computer Science 161
App sandboxes
32
Computer Science 161
Jailbreaks and software security exploits
33
Computer Science 161
Software security
34
Computer Science 161
Types of software security vulnerabilities
90% of vulnerabilities are�memory safety vulns�(Android 2018)
35
Computer Science 161
Defenses against memory safety vulnerabilities
36
Computer Science 161
Sandboxing
More than half of vulns are in�software for interacting with�data/comms from external world�(Android 2018)
⇒ Sandbox media codecs,�iMessage attachments,�HTML/CSS/JS in web browser, ...
37
Computer Science 161
Private cloud compute
38
Computer Science 161
Motivation
39
Computer Science 161
Design
40
Computer Science 161
Attestation
41
Computer Science 161
Transparency log
42
Computer Science 161
Summary
43
Computer Science 161
Wrap-up
44
Computer Science 161
Ask me anything
45
Computer Science 161
Thank you!
46
Computer Science 161