Mihai Chiroiu

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Recent literature on iOS security has focused on the malicious potential of third-party applications, demonstrating how developers can bypass application vetting and code-level protections. In addition to these protections, iOS uses a generic sandbox profile called "container" to confine malicious or exploited third-party applications. In this paper, we(More)
  • 1