Font Size: a A A

The Research Of IOS Applications Vulnerability

Posted on:2017-09-23Degree:MasterType:Thesis
Country:ChinaCandidate:F Y LiFull Text:PDF
GTID:2348330518995590Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of Mobile Internet technology,more and more mobile devices have become part of our daily life,especially smartphones have become an essential tool for people.Android and iOS has occupied 96%of global smartphone market,apparently has become the world's two most mainstream operating systems.Despite the tremendous popularity,in the history of iOS,only a handful of malicious apps have been discovered.This is mainly attributed to the advanced security architecture of iOS and the strict regulations of the App Store.but in recent years iOS application security issues are rising significantly.Insecure iOS application has resulted in the loss of the property of the users and enterprises.The security of iOS application is being paid more and more attention by enterprises.In this paper,we summarized the current security threats of the iOS application and We further analyzed the specific reasons for each security threat.Based on the summary of the security threats,we proposed two different vulnerability detection schemes:based on source code detection scheme and based on binary detection scheme,the main work is as follows:1.The detection scheme based on the source code is implemented by Checker,which is a part of Clang Static Analyzer.The Clang Static Analyzer is a source code analysis tool that finds bugs in C,C++,and Objective-C programs.The static analyzer engine performs path-sensitive exploration of the program and relies on a set of checkers to implement the logic for detecting and constructing specific bug reports.We designed and implemented sixteen checkers to check three different kinds of vulnerabilities.2.The detection scheme based on the binary code is implemented mainly by artificial detection.This detection scheme mainly uses the reverse analysis technology to find bugs.We designed and implemented twenty-one detection items to check five different kinds of vulnerabilities and we give the specific process of each detection items.The results of the detection can provide security advice to enterprises.3.According to the implementation of the two sets of detection scheme,we have carried out experiments to verify the effectiveness and accuracy of the detection scheme.The experiment results show that our two sets of detection scheme can accurately detect the iOS application security problems.
Keywords/Search Tags:iOS application, security, checker, reverse analysis
PDF Full Text Request
Related items