Disassembling and patching iOS applications at assembly level
@article{Gupta2017DisassemblingAP, title={Disassembling and patching iOS applications at assembly level}, author={Chetna Gupta and Arpita Jadhav Bhatt and Sangeeta Mittal}, journal={2017 Tenth International Conference on Contemporary Computing (IC3)}, year={2017}, pages={1-6} }
There are many mobile operating systems for different smartphones. iOS is one of them available exclusively on Apple devices. It offers various features such as GPS tracking, Siri, multi touch gestures, biometric authentication etc. The functionality of an iOS device can be expanded by installing third party applications, available from App store. Apple follows a mandatory code signing process to ensure that applications are developed by trusted enterprises/developers and no malware exists on…
One Citation
Static Analysis Method on Portable Executable Files for REMNUX based Malware Identification
- Computer Science2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)
- 2019
REMnux can be an appropriate tool to check a file’s characteristics in the form of malware or not based on anomalous data check, metadata of file integrity, section entropy, and function that will be executed by that executable file.
References
SHOWING 1-8 OF 8 REFERENCES
iOS Hacker's Handbook
- Computer Science
- 2012
How the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it are explained.
Wire Lurker malware attacks Chinese Apple users, installing bad apps on iOS devices via OS X
- Nov. 6,
- 2014
App Security and Analysis: Part 2/2 Link:http://www.raywenderlich.com/46223/ios-app-security-analysispart-2,August
- 2013
iOS Assembly Tutorial: Understanding ARM
- Link :http://www.raywenderlich.com/37181/ios-assembly-tutorial, June
- 2013
Apple without a Shell – IOS under Targeted Attack’, FireEye, Inc., USA, Published in Virus Bulletin Conference
- 2014
How to Find Vulnerabilities in Mobile Apps through Reverse Engineering
- IT Security, January
- 2013
Aswathy Dinesh and Ming Chow , " An analysis of mobile malware and detection techniques " [ 13 ] Matt Galloway , ' iOS Assembly Tutorial : Understanding ARM
- Prateek Gianchandani , ' iOS Application Security Part 26 – Patching IOS Applications using IDA Pro and Hex Fiend ' , Link : http : / / resources . infosecinstitute . com / ios - application - security - part - 26 - patching - ios - applications - using - ida - pro - hex - fiend / [ 18 ] Wikipedia “
Unixwiz.net Tech Tips Intel x86 JUMP quick reference
- Link: http://www.unixwiz.net/techtips/x86-jumps.html