Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware

Total Page:16

File Type:pdf, Size:1020Kb

Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware Mohamed Elsabagh Ryan Johnson Angelos Stavrou Kryptowire Kryptowire Kryptowire [email protected] [email protected] [email protected] Chaoshun Zuo Qingchuan Zhao Zhiqiang Lin The Ohio State University The Ohio State University The Ohio State University [email protected] [email protected] [email protected] Abstract providers, social media companies, and mobile app develop- ers) can develop and introduce apps into an Android mobile Android devices ship with pre-installed privileged apps in device, with the difference that apps introduced by app devel- their firmware — some of which are essential system compo- opers are typically downloaded from app stores by the users nents, others deliver a unique user experience — that users whereas the rest are directly introduced in the supply-chain cannot disable. These pre-installed apps are assumed to be and pre-installed in device firmware by manufacturers. secure as they are handpicked or developed by the device ven- There are many reasons to introduce pre-installed apps dors themselves rather than third parties. Unfortunately, we in Android firmware. First, pre-installed apps often provide have identified an alarming number of Android firmware that unique features and special services that distinguish a vendor contain privilege-escalation vulnerabilities in pre-installed or device from its competitors. Second, pre-installed apps apps, allowing attackers to perform unauthorized actions such come with pre-approved sensitive permissions and capabili- as executing arbitrary commands, recording the device audio ties that are unavailable to user-level apps downloaded from and screen, and accessing personal data to name a few. To app stores and often do not require user approval or consent uncover these vulnerabilities, we built FIRMSCOPE, a novel to operate. In most cases, pre-installed apps typically run as static analysis system that analyzes Android firmware to ex- the highly-privileged system user and cannot be uninstalled pose unwanted functionality in pre-installed apps using an by the end user, even if a pre-installed app is found to be efficient and practical context-sensitive, flow-sensitive, field- vulnerable, malicious, or simply unwanted. When users face sensitive, and partially object-sensitive taint analysis. Our these threats, their options are limited: wait for an update that experimental results demonstrate that FIRMSCOPE signifi- hopefully fixes the vulnerable pre-installed app; or remove cantly outperforms the state-of-the-art Android taint analysis the app by rooting the device, potentially voiding its warranty solutions both in terms of detection power and runtime perfor- and compromising its security. mance. We used FIRMSCOPE to scan 331;342 pre-installed apps in 2;017 Android firmware images from v4.0 to v9.0 Although intuitive from a marketing and ease of distribu- from more than 100 Android vendors. Among them, FIRM- tion perspectives, software distributed via firmware can ex- SCOPE uncovered 850 unique privilege-escalation vulnerabil- pose end users to severe security risks unbeknownst to them ities, many of which are exploitable and 0-day. and in many cases even to device manufacturers. This was partly shown in the past where Android vendor customization introduced vulnerabilities [3–6]. Of course, vulnerabilities 1 Introduction can have different causes: software that is not tested, poorly tested, or purposefully designed to be easily exploitable or Ever since its acquisition by Google in 2005, we have wit- malicious. Even if the enterprise or an end user is diligent and nessed the rapid development and prodigious adoption of the follows a stringent security guidance, they may still be at risk Android platform. Today, it has become the dominant OS in of malicious or insecure apps that they did not install but were the mobile domain with a market share of 76% [1] as well as present on the device firmware when it was first delivered. the most widely used OS of any platform, surpassing even Therefore, there is a pressing need to address the supply- Windows [2]. Some key factors for the success of Android are chain threats that stem from vulnerable or malicious software its open ecosystem, assortment of available models, inclusion distributed through firmware images on mobile devices. To of Google’s suite of apps, and a multitude of app marketplaces this end, this paper presents FIRMSCOPE, a scalable, compre- hosting millions of Android apps. Currently, anyone (includ- hensive, and automated static taint analysis system to identify ing hardware vendors, device manufacturers, cellular service the firmware-borne vulnerabilities residing in pre-installed apps, both malicious and (un)intentionally insecure, present 2 Background and Threat Model in Android firmware. Not all vulnerabilities are of our inter- est, and instead we particularly focus on detecting privilege- Background. Android apps are composed of app compo- escalation vulnerabilities in pre-installed apps where the sensi- nents, which are functional code units that developers use to tive behavior is externally invokable (e.g., by a third-party app build an app. App components are implemented by extending or a remote party). For instance, an unprivileged third-party certain framework classes containing a platform-managed app executing a command as the system user by exploiting lifecycle. App components serve as app entry points and an insecure interface of a pre-installed app. can be started by the app itself, the system, and sometimes While static taint analysis of mobile apps has been well external apps, effectively permitting the sharing of code and studied (e.g., [7–11]) there are still enormous challenges (due possibly data. Components include Activities (GUI screens), to the complex OOP language constructs and also sophisti- Services, Broadcast Receivers, and Content Providers. Each cated control and data flows in Android APIs and callbacks) Android app contains an AndroidManifest.xml file listing to the precision and scalability of the analysis when applied all the app’s components and various configuration data. to real-world apps without source code access. For instance, Android apps are sandboxed by the kernel where each app how to precisely and efficiently track data flows through dif- runs in its own isolated process and gets an isolated private ferent objects, class fields, the Android framework APIs, and storage space on the filesystem. By default, apps are not runtime callbacks. We have thus developed several novel allowed to execute code in each other’s context or access each techniques in FIRMSCOPE to handle these challenges in an other’s data. There is no system-wide enclave for sensitive efficient and precise manner suitable for large scale real-world data. Instead, each app stores its own private information in app analysis. FIRMSCOPE achieves unprecedented detection its sandboxed storage space. power and performance. It incurs only 7 FPs and 11 FNs on A pre-installed app is any app that comes pre-loaded with the latest DroidBench 2.0 [12], and is 2X to 24X faster than a firmware image. These apps can be non-essential apps that FlowDroid [9], Amandroid [10], and DroidSafe [11]. the device vendor decided to ship with the firmware (e.g., We have evaluated FIRMSCOPE on 331;342 pre-installed bloatware) or internal firmware apps implementing critical apps from 2;017 Android firmware images from v4.0 to v9.0 system components necessary for the proper functionality covering more than 100 Android vendors, including the top of the device (e.g., managing device settings, apps installa- 20 Android vendors worldwide. FIRMSCOPE has uncovered a tion, and carrier negotiation). Pre-installed firmware apps are total of 850 unique privilege-escalation vulnerabilities (3;483 typically installed under /system/app and /system/priv- total) in 1;547 firmware (77% of the analyzed images). These app on a read-only device partition whereas apps downloaded vulnerabilities included code and command injection; obtain- from app stores are installed under /data. ing the modem logs and Logcat logs; wiping all user data Pre-installed apps are privileged by design; some can run from a device (i.e., factory reset); accessing, sending, and in the background as the privileged system user and cannot manipulating calls and text messages; (un)installing arbitrary be uninstalled by the end-user. Android has four permission apps; recording the device screen and microphone; among protection levels: Normal (lowest), Dangerous, Privileged, others. Coordinated disclosure of our findings is still ongoing. and Signature (highest).1 Pre-installed apps can access highly Thus far, we have disclosed 370 vulnerabilities in Android 7 sensitive device functionalities protected by Privileged- and to 9 to impacted vendors and received 147 CVEs. Signature-level permissions that are not accessible by third- In short, we make the following contributions: party apps downloaded from app stores. Due to the highly- privileged status of these apps, (un)intentional design or pro- • Novel System. We present FIRMSCOPE, a scalable, com- gramming mistakes can facilitate confused deputy attacks, prehensive, and automated system to identify privilege- allowing unprivileged third-party apps, and perhaps remote escalation vulnerabilities residing in pre-installed apps in entities, to abuse the capabilities of pre-installed apps and Android firmware at a large scale. cross security boundaries set by the Android OS. Threat Model. An Android firmware archive typically con- • Efficient Techniques. We significantly improve the scala- tains several modules, including a bootloader, the Android bility and accuracy of existing static taint analysis with an Linux kernel, the Android runtime framework, an embedded efficient on-demand custom flow-, context-, field-sensitive, radio firmware, and pre-installed apps. We exclusively focus and partially object-sensitive analysis. on discovering vulnerabilities in pre-installed firmware apps. Our objective is to use static analysis to uncover high-impact weaknesses (often posing as backdoors) in pre-installed apps • Large-Scale Evaluation.
Recommended publications
  • Creationstation ® Guide
    SAFARI Montage CreationStation User Guide SAFARI Montage CreationStation® Overview SAFARI Montage CreationStation is an easy-to-use integrated module that enables schools and districts to upload user-created digital content and licensed media to the SAFARI Montage system's Learning Object Repository (LOR). User types granted upload privileges, such as Student with Upload, Teacher with Upload and higher level user types can add items either individually or in bulk. Once uploaded, content can be meta-tagged with information such as a detailed description, relevant grade ranges and year of copyright, uploads can be correlated to curriculum standards and designated for home access, download, etc. Video and audio content can be segmented into chapters and key concepts, each with their own segment descriptions. Flexible Digital Rights Management provides control over the content to ensure that the correct users have access to digital resources. Media and web links uploaded via CreationStation are fully searchable in conjunction with licensed content, providing a wealth of digital resources that are easily accessible and able to be used with other system features for instructional purposes. When used in conjunction with SAFARI Montage WAN Manager, digital resources can be shared with others in the same school as the user who uploaded it, or published to all schools in the district. Student user types have an appropriately limited ability to upload to the SAFARI Montage system through the CreationStation feature, My Locker. To learn more, refer to the following Help topics: Uploading Media into CreationStation Adding and Editing Metadata Searching for Uploaded Content Using Uploaded Content My Locker for Students - CreationStation video tutorial Accessing CreationStation 1 SAFARI_Montage_creation 1.
    [Show full text]
  • Initial Setup of Your IOS Device
    1. When you first turn on your iOS device, you'll see a screen displaying Hello in different languages. Slide from left to right anywhere on this screen. 2. Select the language you want your iOS device to use, and then the region in which you'll be using your iOS device. This will affect things such as date, time, and contact formatting. 3. Your iOS device requires an Internet connection to set up. Tap the name of your desired Wi-Fi network to begin device activation. § If you're activating an iPhone or iPad (Wi-Fi + Cellular) with active cellular service, you can instead choose cellular activation. 4. Choose whether to enable Location Services. 5. Set up your iPhone as a new device, from an iCloud backup, or from an iTunes backup. § If restoring from backup, you can learn how to restore your content. 6. Sign in with your Apple ID, which you've created previously, or create a free Apple ID. § Alternatively, you can tap Skip This Step to sign in or create an Apple ID later. § If necessary, learn how to create a free Apple ID: 1. Select your birthday, then tap Next: 2. Enter your first and last name, then tap Next: 3. You can then use either your current email address, or choose to get a free iCloud email address. Select the option you'd like, then tap Next. 4. Enter your current email address, or what you'd like for your iCloud email, then tap Next. 5. Enter what you'd like for your password and tap Next.
    [Show full text]
  • View Managing Devices and Corporate Data On
    Overview Managing Devices & Corporate Data on iOS Overview Overview Contents Businesses everywhere are empowering their employees with iPhone and iPad. Overview Management Basics The key to a successful mobile strategy is balancing IT control with user Separating Work and enablement. By personalizing iOS devices with their own apps and content, Personal Data users take greater ownership and responsibility, leading to higher levels of Flexible Management Options engagement and increased productivity. This is enabled by Apple’s management Summary framework, which provides smart ways to manage corporate data and apps discretely, seamlessly separating work data from personal data. Additionally, users understand how their devices are being managed and trust that their privacy is protected. This document offers guidance on how essential IT control can be achieved while at the same time keeping users enabled with the best tools for their job. It complements the iOS Deployment Reference, a comprehensive online technical reference for deploying and managing iOS devices in your enterprise. To refer to the iOS Deployment Reference, visit help.apple.com/deployment/ios. Managing Devices and Corporate Data on iOS July 2018 2 Management Basics Management Basics With iOS, you can streamline iPhone and iPad deployments using a range of built-in techniques that allow you to simplify account setup, configure policies, distribute apps, and apply device restrictions remotely. Our simple framework With Apple’s unified management framework in iOS, macOS, tvOS, IT can configure and update settings, deploy applications, monitor compliance, query devices, and remotely wipe or lock devices. The framework supports both corporate-owned and user-owned as well as personally-owned devices.
    [Show full text]
  • Apps by Grade Levels for Website
    The following is a list of the iOS Apps and instructional software that are made available by the district for our teachers to use. Not every app is used by every teacher and not every app is used daily, weekly, etc… Level 1: Instructional Apps and Software Utilized to Support Multiple Uses During Instruction. More commonly used for instruction. Level 2: Instructional Apps and Software Utilized to Support Content Specific Teaching Level 3: Instructional Apps and Software Utilized for Specific Projects, Individual Student Intervention Needs or Specialized Topics During the Year LEVEL 1: Apple Classroom, Epic!, Math IXL, Kids A-Z, KRA, SeeSaw, Self Service, Brain Pop Jr., Google Drive, LEVEL 2: 10 Fram Fill, ABC Magic, Chatter Pix, Hundred Board, Letter School, Little Speller, Marble Math, Math Bingo, Math Slide, Patterns, Starfall ABC’s, Writing Wizard, KINDERGARTEN ABC Ya Games, Expeditions, Khan Academy, Number Line, Number Pieces, 3 Letter Words,Math Tapper, Todo Math LEVEL 3: Montessori Words, Number Flash/Frames/Quiz, Spelling Bee, Word Bingo, Cork the Volcano Puzzlet, Draw and Tell, Sight Words, Tiggly Adventures, Toontastic 3D, Touchtronic 123/ABC LEVEL 1: Apple Classroom, Book Creator, Clips, Math IXL, Kids A-Z, Epic!, Brain Pop Jr., SeeSaw, Pages, Self Service LEVEL 2: 10 Fram Fill, Chatter Pix, Hands on Hundreds, Math Tapper, Number Rack, Writing Wizard, Geoboard, Montessori Crosswords, Number Line, Number Pieces, 1st Grade Vocabulary Spelling City, Math Drills LEVEL 3: Cork the Volcano, Doodle Buddy Draw, Pic Collage, Osmo Masterpiece,
    [Show full text]
  • 11 Cool Things.Cwk
    “Impress your students and friends!” 11 Cool Things to do with your iBook 1. Sherlock - Translating words and phrases Using the Translation channel in Sherlock, you can translate words and phrases between a number of different languages. For example, you can translate "apple" from English to French. 1. Open Sherlock and click Translation. 2. Type the word or phrase you want to translate in the Original Text box. 3. Choose the original language and the language you want to translate the word into from the pop-up menu, then click Translate. 4. You can select and copy the translation, then paste it into another application. 2. Safari - 3 Cool Things! 1. Built-in Google search - Safari includes Google searching in the address bar. Just type what you're looking for in the search box and press Return. 2. SnapBack as you browse - Safari lets you quickly return to your starting web page by clicking the SnapBack button in the address box. 3. Blocking pop-up windows - Safari can block pop-up windows so that you only see the web pages you want to see. Just choose Block Pop-up Windows from the Safari menu. 3. Any selected text can be spoken by your iBook. Do this: 1. Choose Apple menu > System Preferences and click Speech. 2. Click Spoken User Interface. 3. To have the computer speak the text that's highlighted when you press specific keys, select the "Selected text when the key is pressed" checkbox and enter the key or keys to press. For example, if you select a sentence on a web page and then press the keys you entered in the Spoken User Interface pane, the computer speaks the sentence.
    [Show full text]
  • Apple TV Management
    WHITE PAPER Apple TV Management Moving education forward If you think Apple TV devices are just for entertainment, think again. In a recent Jamf Nation survey, 99 percent of the 502 school respondents report leveraging Apple TV devices in their education institution, and for good reason. They enable wireless sharing without the need for adapters, and they make the classroom a more collaborative and engaging learning environment. Apple TV is also applicable outside the classroom. But until recently, they haven’t necessarily been easy to set up and manage. That all changed with tvOS 10.2, which recently became available with all fourth-generation Apple TV devices. IN THIS WHITE PAPER, LEARN: • Why Apple TV matters for education. • How to make set up and management easy with mobile device management. • How to leverage Apple TV beyond the classroom. Why Apple TV for education Like Mac and iPad, Apple TV is a powerful tool for educators. Twenty-three percent of schools surveyed about their Apple TV usage have 51-100 Apple TV devices, with a further 23 percent citing 101-500 TV devices. From promoting interaction and collaboration to fitting seamlessly within the Apple ecosystem, the use cases and benefits are vast. Before expanding on these, let’s examine three core Apple TV fundamentals that are key to its appeal. GOODBYE DONGLES. HELLO AIRPLAY. AIRPLAY FOR NON-APPLE DEVICES AirPlay is a wireless streaming technology. Introduced While AirPlay is built into all Apple devices, Apple in 2004, it eliminates the need for display adapters, TV works with common non-Apple platforms and changing the way presentations are delivered and devices, such as Windows and Chromebook.
    [Show full text]
  • Managing Apple TV Devices with Tvos 10.2 Or Later Using Jamf Pro
    Managing Apple TV Devices with tvOS 10.2 or Later Using Jamf Pro Technical Paper Jamf Pro 10.4.0 or Later 11 April 2018 © copyright 2002-2018 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite 1100 Minneapolis, MN 55401-2155 (612) 605-6625 The CASPER SUITE, Jamf, the Jamf Logo, JAMF SOFTWARE®, and the JAMF SOFTWARE Logo® are registered or common law trademarks of JAMF SOFTWARE, LLC in the U.S. and other countries. Apple, the Apple logo, Apple TV, AirPlay, iPad, iPod touch, and tvOS are trademarks of Apple Inc., registered in the United States and other countries. App Store is a service mark of Apple Inc., registered in the United States and other countries. IOS is a trademark or registered trademark of Cisco in the United States and other countries. All other product and service names mentioned herein are either registered trademarks or trademarks of their respective companies. Contents Contents 4 Introduction 4 What’s in This Guide 4 Additional Resources 5 Overview 5 Requirements 6 tvOS PreStage Enrollments 6 Requirements 6 Configuring a tvOS PreStage Enrollment 7 Related Information 8 tvOS Configuration Profiles 8 Restrictions Payload Settings for Apple TV 9 Single App Mode Payload Settings for Apple TV 9 Conference Room Display Payload Settings for Apple TV 10 Home Screen Layout Payload Settings for Apple TV 10 TV Remote Payload Settings for Apple TV 10 Related Information 11 Other tvOS Management Options 11 Enforcing a tvOS Device Name 11 tvOS Remote Commands 12 AirPlay Display Options 3 Introduction What’s in This Guide This guide provides step-by-step instructions for enrolling and managing Apple TV devices with tvOS 10.2 or later.
    [Show full text]
  • Online Platforms and Market Power Part 6: Examining the Dominance of Amazon, Apple, Facebook, and Google Questions for the Recor
    Online Platforms and Market Power Part 6: Examining the Dominance of Amazon, Apple, Facebook, and Google Questions for the Record from the Honorable David N. Cicilline, Chairman, Subcommittee on Antitrust, Commercial and Administrative Law of the Committee on the Judiciary Questions for Mr. Tim Cook, CEO, Apple, Inc. 1. You testified that Apple’s apps “go through the same rules” that third-party apps are required to follow. The App Store Guidelines (“Guidelines”) are designed to ensure that the App Store remains a safe and trusted place for consumers to discover and download software for their Apple devices. The Guidelines apply to any app, Apple or third-party, that is available on the App Store in the first instance. a. How many Apple apps are pre-loaded on current iPhone models? The first iPhone included 13 integrated Apple apps. There were no third-party apps available for that iPhone. Apple’s subsequent decision to open the iPhone to third-party app development unleashed a wave of innovation and competition. Thirteen years later, there are more than 1.8 million third-party apps available through the App Store and only about 40 Apple apps integrated into the current iPhone models. Apple’s focus has always been to deliver a great consumer experience out of the box. That is why the iPhone comes with Apple apps like Phone, Notes, Settings, Files, Clock, Tips, Measure, and Reminders to provide basic functionality. In addition, apps like FaceTime, iMessage, Apple Music, TV, and others help differentiate the iPhone in a competitive smartphone market. The few apps that Apple has integrated into the iPhone are a drop in the bucket of the overall app ecosystem.
    [Show full text]
  • Getting to Know Siri
    Chapter 1 Getting to Know Siri In This Chapter ▶ Seeing what — or rather, who — Siri is ▶ Setting up Siri for your personal use ▶ Exploring different ways to use Siri ▶ Finding out how to get fast and reliable replies ▶ Teaching Siri what to call you ongratulations! You’re now the owner of the most definitive Cguide to Siri on the planet. This easy-to-read For Dummies title will teach you everything you need to know about Siri — and then some. Be prepared to master all of Siri’s amazing features, at your own pace, so you can get a lot more out of your beloved iPhone, iPad (and iPad mini), or iPod touch. But first, a few words about my introduction to Siri, what Siri is exactly, and a bit of history. As a longtime technology reviewer, I firmly believe Siri (pronounced SEAR-ree) is the start of something very special, and it was love at first sight — er, speech. Here I am, sitting in the crowd at Apple headquarters in Cupertino, California, on October 4, 2011. The exclusive press event is called “Let’s Talk iPhone,” and like many other journalists and analysts in theCOPYRIGHTED room, I was expecting Apple CEO MATERIAL Tim Cook to take the wraps off the iPhone 5. When the iPhone 4S was initially debuted, you could sense the ini- tial disappointment among the attendees — after all, there were so many rumors leading up to the event that it seemed inevitable that a dramatically new smartphone would be unveiled that day. But that letdown feeling completely vanished the moment Siri was introduced.
    [Show full text]
  • Oracle® Beehive Oracle Beehive Standards-Based Clients Help Release 2 (2.0)
    Oracle® Beehive Oracle Beehive Standards-Based Clients Help Release 2 (2.0) November 2011 Last updated on November 4, 2011 This page contains configuration instructions and other related information for the following standards-based clients supported by Oracle Beehive: Hardware and Software Certification Managing your E-Mails ■ Apple Mail ■ Microsoft Outlook ■ Mozilla Thunderbird Managing Calendar and Task List ■ Apple iCal ■ Mozilla Lightning Using Instant Messaging ■ Apple iChat ■ Pidgin ■ Trillian Pro Accessing Documents (Web Clients and FTP Clients) ■ Browser-based Access ■ Desktop WebDAV Clients ■ Mac OS X Finder Web Access ■ Cadaver ■ Microsoft Windows Web Folders ■ Desktop FTP Clients ■ FileZilla ■ NCFTP ■ SmartFTP ■ Transmit RSS Clients Mobile Access Documentation Accessibility 1 Hardware and Software Certification The hardware and software requirements included in this installation guide were current at the time this guide was published. However, because new platforms and operating system software versions might be certified after this guide is published, review the certification matrix on the My Oracle Support Web site for the most up-to-date list of certified hardware platforms and operating system versions. My Oracle Support is available at the following URL: http://support.oracle.com/ You must register online before using My Oracle Support. Use the following steps to locate the certification information for your platform: 1. After logging in, click the Certifications tab. 2. In the Certification Search pane, on the Search tab, select the following information: ■ Product: Enter the product name or select from the drop-down list of Products. ■ Release: Select the release number of the product. ■ Platform: Select the target platform by choosing from the submenu list.
    [Show full text]
  • What's New for Business
    What’s New for Business WWDC 2021 The latest software updates from Apple enable employees to be more productive and collaborative. IT and security enhancements simplify deployment and management. And platform updates help developers build the next generation of business apps. Connect with your team Enhanced security and deployment for Mac Updates to FaceTime on iOS 15, iPadOS 15 and macOS Apple Configurator for iPhone now makes it possible to add a Monterey enable employees to easily share their screen or T2 or Apple silicon Mac to Apple Business Manager regardless interact with other content with SharePlay. New camera and of where it was purchased. Admins can now remotely install and microphone modes help reduce background distractions. Links remove System Extensions using MDM. Security enhancements to FaceTime calls can now be added to calendar invites and calls include the ability to set a password for recoveryOS and set can now be joined from any device, including other platforms. remote lock on Mac computers with Apple silicon. Software updates have new enforcement options and a Mac can now Be in the moment more seamlessly erase all content and settings in one step. New Focus modes across iOS, iPadOS and macOS help make it easy to concentrate on current tasks by muting non-urgent Extended iPhone and iPad management notifications. Focus status can be broadcast in messaging apps. Managed Open-In controls the flow of corporate data between Notifications have been redesigned and the all-new notification managed or unmanaged apps and has now been extended to summary helps to deliver the right content at the right time.
    [Show full text]
  • Using an Ipad Or Iphone on Apple Ios 11
    Using an iPad or iPhone on Apple iOS 11 Table of Contents Important Icons ......................................................................................................................................... 2 Common Gestures ..................................................................................................................................... 3 Common Buttons....................................................................................................................................... 3 Keyboard .................................................................................................................................................... 4 Settings ...................................................................................................................................................... 5 Accessibility ............................................................................................................................................... 5 iOS vs Model Version ................................................................................................................................ 6 Airplane Mode ........................................................................................................................................... 6 Security ...................................................................................................................................................... 7 Notes .........................................................................................................................................................
    [Show full text]