We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.AR

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones

Abstract: When an iPhone is turned off, most wireless chips stay on. For instance, upon user-initiated shutdown, the iPhone remains locatable via the Find My network. If the battery runs low, the iPhone shuts down automatically and enters a power reserve mode. Yet, users can still access credit cards, student passes, and other items in their Wallet. We analyze how Apple implements these standalone wireless features, working while iOS is not running, and determine their security boundaries. On recent iPhones, Bluetooth, Near Field Communication (NFC), and Ultra-wideband (UWB) keep running after power off, and all three wireless chips have direct access to the secure element. As a practical example what this means to security, we demonstrate the possibility to load malware onto a Bluetooth chip that is executed while the iPhone is off.
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
Journal reference: WiSec 2022: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks
DOI: 10.1145/3507657.3528547
Cite as: arXiv:2205.06114 [cs.CR]
  (or arXiv:2205.06114v1 [cs.CR] for this version)

Submission history

From: Jiska Classen [view email]
[v1] Thu, 12 May 2022 14:29:49 GMT (2008kb,D)

Link back to: arXiv, form interface, contact.