Apple iOS is one of the most popular mobile operating sys-tems. As its core security technology, iOS provides applica-tion sandboxing but assigns a generic sandboxing profile to every third-party application. However, recent attacks and incidents with benign applications demonstrate that this de-sign decision is vulnerable to crucial privacy and security breaches, allowing applications (either benign or malicious) to access contacts, photos, and device IDs. Moreover, the dynamic character of iOS apps written in Objective-C ren-ders the currently proposed static analysis tools less useful. In this paper, we aim to address the open problem of preventing (not only detecting) privacy leaks and simulta-neously strengthening security against runt...
Despite extensive research over the last two decades, runtime attacks on software are still prevalen...
Part 2: Malware DetectionInternational audienceRecent research indicates that mobile platforms, such...
Mobile smart devices are changing our lives and are the emerging dominant computing platform for end...
Apple iOS is one of the most popular mobile operating systems. As its core security technology, iOS ...
With the introduction of Apple’s iOS and Google’s An-droid operating systems, the sales of smartphon...
Until very recently it was widely believed that iOS malware is effectively blocked by Apple's vettin...
Abstract. iOS is Apple’s mobile operating system, which is used on iPhone, iPad and iPod touch. Any ...
With the booming sale of iOS devices, the number of iOS applications has increased significantly in ...
iOS operating system, which is developed by Apple Inc., is claimed to be the most secure product in ...
Do iOS applications breach privacy? With plethora of iOS applications available in market, most user...
Runtime and control-flow attacks (such as code injection or return-oriented programming) constitute ...
With the increased convergence of technologies whereby a user can access, store and transmit data ac...
We present DiOS, a practical system to perform automated dynamic privacy analysis of iOS apps. DiOS...
Smartphones, the devices we carry everywhere with us, are being heavily tracked and have undoubtedly...
If you're an app developer with a solid foundation in Objective-C, this book is an absolute must-cha...
Despite extensive research over the last two decades, runtime attacks on software are still prevalen...
Part 2: Malware DetectionInternational audienceRecent research indicates that mobile platforms, such...
Mobile smart devices are changing our lives and are the emerging dominant computing platform for end...
Apple iOS is one of the most popular mobile operating systems. As its core security technology, iOS ...
With the introduction of Apple’s iOS and Google’s An-droid operating systems, the sales of smartphon...
Until very recently it was widely believed that iOS malware is effectively blocked by Apple's vettin...
Abstract. iOS is Apple’s mobile operating system, which is used on iPhone, iPad and iPod touch. Any ...
With the booming sale of iOS devices, the number of iOS applications has increased significantly in ...
iOS operating system, which is developed by Apple Inc., is claimed to be the most secure product in ...
Do iOS applications breach privacy? With plethora of iOS applications available in market, most user...
Runtime and control-flow attacks (such as code injection or return-oriented programming) constitute ...
With the increased convergence of technologies whereby a user can access, store and transmit data ac...
We present DiOS, a practical system to perform automated dynamic privacy analysis of iOS apps. DiOS...
Smartphones, the devices we carry everywhere with us, are being heavily tracked and have undoubtedly...
If you're an app developer with a solid foundation in Objective-C, this book is an absolute must-cha...
Despite extensive research over the last two decades, runtime attacks on software are still prevalen...
Part 2: Malware DetectionInternational audienceRecent research indicates that mobile platforms, such...
Mobile smart devices are changing our lives and are the emerging dominant computing platform for end...