Disassembling and patching iOS applications at assembly level

@article{Gupta2017DisassemblingAP,
  title={Disassembling and patching iOS applications at assembly level},
  author={Chetna Gupta and Arpita Jadhav Bhatt and Sangeeta Mittal},
  journal={2017 Tenth International Conference on Contemporary Computing (IC3)},
  year={2017},
  pages={1-6}
}
There are many mobile operating systems for different smartphones. iOS is one of them available exclusively on Apple devices. It offers various features such as GPS tracking, Siri, multi touch gestures, biometric authentication etc. The functionality of an iOS device can be expanded by installing third party applications, available from App store. Apple follows a mandatory code signing process to ensure that applications are developed by trusted enterprises/developers and no malware exists on… 

Figures from this paper

Static Analysis Method on Portable Executable Files for REMNUX based Malware Identification
TLDR
REMnux can be an appropriate tool to check a file’s characteristics in the form of malware or not based on anomalous data check, metadata of file integrity, section entropy, and function that will be executed by that executable file.

References

SHOWING 1-8 OF 8 REFERENCES
iOS Hacker's Handbook
TLDR
How the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it are explained.
Wire Lurker malware attacks Chinese Apple users, installing bad apps on iOS devices via OS X
  • Nov. 6,
  • 2014
App Security and Analysis: Part 2/2 Link:http://www.raywenderlich.com/46223/ios-app-security-analysispart-2,August
  • 2013
iOS Assembly Tutorial: Understanding ARM
  • Link :http://www.raywenderlich.com/37181/ios-assembly-tutorial, June
  • 2013
Apple without a Shell – IOS under Targeted Attack’, FireEye, Inc., USA, Published in Virus Bulletin Conference
  • 2014
How to Find Vulnerabilities in Mobile Apps through Reverse Engineering
  • IT Security, January
  • 2013
Aswathy Dinesh and Ming Chow , " An analysis of mobile malware and detection techniques " [ 13 ] Matt Galloway , ' iOS Assembly Tutorial : Understanding ARM
  • Prateek Gianchandani , ' iOS Application Security Part 26 – Patching IOS Applications using IDA Pro and Hex Fiend ' , Link : http : / / resources . infosecinstitute . com / ios - application - security - part - 26 - patching - ios - applications - using - ida - pro - hex - fiend / [ 18 ] Wikipedia “
Unixwiz.net Tech Tips Intel x86 JUMP quick reference
  • Link: http://www.unixwiz.net/techtips/x86-jumps.html