Analysis Based on iOS Application Malicious Behavior Detection

Article Preview

Abstract:

Due to the highly developed modern technology,Smart phones and other mobile devices are become more and more universal. Most of those devices are used to process or store sensitive and confidential data.Consequently,it may cause many problems,such as privacy disclosure,mobile phone virus,spyware,etc. In order to solve those issues,We need to monitor applications`s behaviour to tell those malicious ones. Here we use MobileSubstrate to hook every sensitive system API the application invokes in iOS planform,and send this invocation to our matching algorithm,the matching algorithm will evaluate if the API are being invoked in a safe way according to Application API Review Model.If a application trying to call some APIs which is totally unnecessary,we can reject this invoke and give user a warning.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2321-2325

Citation:

Online since:

August 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Jonathan Zdziarski: Hacking and Securing iOS Applications [M]. O'Reilly, (2012).

Google Scholar

[2] Cedric Halbronn, Jean Sigwald : iPhone security model & vulnerabilities. HITB SecConf (2010).

Google Scholar

[3] Shub-Nigurrath: Primer on Reversing Jailbroken iPhone Native Applications.

Google Scholar

[4] Information on http: /www. cydiasubstrate. com/inject/darwin.

Google Scholar

[5] Information on https: /developer. apple. com/library/ios/navigation/index. html.

Google Scholar

[6] Sean Morrissey: iOS Forensic Analysis: for iPhone, iPad, and iPod touch[M], Apress, (2010).

DOI: 10.1007/978-1-4302-3343-5

Google Scholar

[7] Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna: PiOS: Detecting Privacy Leaks in iOS Applications. NDSS (2011).

Google Scholar

[8] Charlie Miller, Dionysus Blazakis, Dino Dai Zovi: iOS Hacker`s Handbook[M], (2012).

Google Scholar