Font Size: a A A

Research On The Security Of IOS Application

Posted on:2015-12-20Degree:MasterType:Thesis
Country:ChinaCandidate:J L ChenFull Text:PDF
GTID:2298330452464126Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the wide application and rapid development of Internettechnology, accessing to all types of information becomes more urgent forpeople. Via the Internet and smart operating system, the smartphone whichcan acquire and process information whenever and wherever people needhas become a readily mobile intelligent terminal.As social networks, e-mail, instant messaging and other types ofsoftware are frequently used, lots of private information is stored in thesmartphone. Therefore, the security of mobile intelligent terminal,especially the application security closely related with users’ privacy, isnow gradually capturing the attention of researchers.iOS is a kind of mobile operating system developed for Apple’smobile device. iOS security has become a research hotspot recent years. Inthis paper, we focus on the application security and its analysis techniqueof iOS.In this paper, we propose a feature detection technique. By analysingthe data security problem in iOS file system and iTunes Backups, wesummarize the application interfaces as well as the strings used byapplications that may access the sensitive user data in order to findpossible security risk in applications.In this paper, we also propose an anomaly detection technique basedon KNN classified statistic which uses a data mining algorithm. With thistechnique, abnormal iOS applications can be differentiated from thenormal ones, even when the control flow of application cannot be fullyreconstructed.Based on the above two techniques, an application security analysis system on iOS is designed and developed. In this system, iOS applicationscan be sampled from Internet, analysed automatically and a detailedanalysis report will be given at last.
Keywords/Search Tags:iOS, security analysis, application security, privacy
PDF Full Text Request
Related items