Font Size: a A A

Study On IOS-Based System Security

Posted on:2015-03-19Degree:MasterType:Thesis
Country:ChinaCandidate:N LingFull Text:PDF
GTID:2298330467963348Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
iOS system is an operating system for handheld devices which developed by Apple. On January9,2007, Apple announced this system at Macworld Conference which was originally designed for iPhone use, and then gradually applied to the iPod touch, iPad and Apple TV and other Apple products. As of now, Apple has released iOS7.0.3version. iOS supports Wi-Fi, video phones, GPS positioning and installing third-party developed applications and other functions, it also has the electronic market (App Store) which is most attractive, centralized management application for users to download. With the growing popularity of smart mobile devices, we needs its function has been further improved. A number of security issues alone with it, these security issues including privacy leak, mobile phone viruses, and other malicious programs. This paper discusses the background, significance, research status and existing problems, analyzes the security system and iOS system6key technologies related to:the privilege separation, Data Encryption, Code Signing, Data Execution Protection, Address Space Layout Randomization and Sandbox technology. Through these technology researches, analyzes iOS system security architecture to analysis its safety and security principles.This article made specific research and technological innovation as follows:First, for key-based data protection issues by describing the Data Protection API and data protection key hierarchy as the theoretical foundation, design, experiment, study the way from the code to explore its safety and prove that the correctness described through experimental results.Second, for code signing and memory protection issues, studying the mandatory access control, authorization works, Signature implementation methodology and theoretical basis of dynamic code signing, write code using the iOS kernel vulnerabilities successfully destroyed the code signing mechanism, demonstrated the accuracy of the problem.Thirdly, comparing the iOS system and open source Android system in safety performance, analysis both in the ability to withstand attacks, security measures the performance of two parts on the merits, given both in the11safety indicators in the rating situation.Finally, in concluding this paper, research directions are analyzed and prospected based on the results of the iOS system security.
Keywords/Search Tags:iOS System, Data Protection, Code Signing, ASLRjailbreak
PDF Full Text Request
Related items