{"title":"在组装级拆解和修补iOS应用程序","authors":"Chetna Gupta, Arpita Jadhav Bhatt, S. Mittal","doi":"10.1109/IC3.2017.8284326","DOIUrl":null,"url":null,"abstract":"There are many mobile operating systems for different smartphones. iOS is one of them available exclusively on Apple devices. It offers various features such as GPS tracking, Siri, multi touch gestures, biometric authentication etc. The functionality of an iOS device can be expanded by installing third party applications, available from App store. Apple follows a mandatory code signing process to ensure that applications are developed by trusted enterprises/developers and no malware exists on App Store. However, past attacks on iOS devices such as ikee, Wirelurker have revealed that Apple's code signing process is not sufficient to ensure the security of its devices. Considering past attacks on iOS devices and with view of analyzing the behavior of iOS applications, this paper aims to describe how an analyst can perform reverse engineering of iOS applications by disassembling, decompiling and debugging application's code using Disassembler to discover the vulnerable areas.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Disassembling and patching iOS applications at assembly level\",\"authors\":\"Chetna Gupta, Arpita Jadhav Bhatt, S. Mittal\",\"doi\":\"10.1109/IC3.2017.8284326\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There are many mobile operating systems for different smartphones. iOS is one of them available exclusively on Apple devices. It offers various features such as GPS tracking, Siri, multi touch gestures, biometric authentication etc. The functionality of an iOS device can be expanded by installing third party applications, available from App store. Apple follows a mandatory code signing process to ensure that applications are developed by trusted enterprises/developers and no malware exists on App Store. However, past attacks on iOS devices such as ikee, Wirelurker have revealed that Apple's code signing process is not sufficient to ensure the security of its devices. Considering past attacks on iOS devices and with view of analyzing the behavior of iOS applications, this paper aims to describe how an analyst can perform reverse engineering of iOS applications by disassembling, decompiling and debugging application's code using Disassembler to discover the vulnerable areas.\",\"PeriodicalId\":147099,\"journal\":{\"name\":\"2017 Tenth International Conference on Contemporary Computing (IC3)\",\"volume\":\"91 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Tenth International Conference on Contemporary Computing (IC3)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3.2017.8284326\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Tenth International Conference on Contemporary Computing (IC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3.2017.8284326","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Disassembling and patching iOS applications at assembly level
There are many mobile operating systems for different smartphones. iOS is one of them available exclusively on Apple devices. It offers various features such as GPS tracking, Siri, multi touch gestures, biometric authentication etc. The functionality of an iOS device can be expanded by installing third party applications, available from App store. Apple follows a mandatory code signing process to ensure that applications are developed by trusted enterprises/developers and no malware exists on App Store. However, past attacks on iOS devices such as ikee, Wirelurker have revealed that Apple's code signing process is not sufficient to ensure the security of its devices. Considering past attacks on iOS devices and with view of analyzing the behavior of iOS applications, this paper aims to describe how an analyst can perform reverse engineering of iOS applications by disassembling, decompiling and debugging application's code using Disassembler to discover the vulnerable areas.