Review of iOS Malware Analysis

被引:1
|
作者
Zhu Yixiang [1 ]
Zhang Kang [2 ]
机构
[1] China Telecom Corp Ltd, Shanghai Res Inst, Natl Engn Lab Mobile Internet Syst & Applicat Sec, Shanghai, Peoples R China
[2] China Telecom Corp Ltd, Shanghai Branch, Informat Network Dept, Shanghai, Peoples R China
关键词
iOS security; malicious code; malicious application;
D O I
10.1109/DSC.2017.104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security architecture and distribution of iOS was introduced. The threats to user's data security and privacy from iOS malicious applications were analyzed. The reasons that the number of iOS malicious applications is less than Android malicious applications were discussed. The attacking methods of emerging iOS malicious applications were summed up. And prospect for future mitigation and confrontation strategies was given.
引用
收藏
页码:511 / 515
页数:5
相关论文
共 50 条
  • [31] A New Malware Classification Approach Based on Malware Dynamic Analysis
    Fang, Ying
    Yu, Bo
    Tang, Yong
    Liu, Liu
    Lu, Zexin
    Wang, Yi
    Yang, Qiang
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 173 - 189
  • [32] Mathematical modeling of the propagation of malware: a review
    Martin del Rey, Angel
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (15) : 2561 - 2579
  • [33] Comprehensive Review of Malware Detection Techniques
    Inayat, Usman
    Zia, Muhammad Fahad
    Ali, Fahad
    Ali, Syed Moshin
    Khan, Hafiz Muhammad Ashja
    Noor, Wafa
    4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 677 - 682
  • [34] Review of the mobile malware detection approaches
    Skovoroda, Anastasia
    Gamayunov, Dennis
    23RD EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP 2015), 2015, : 600 - 603
  • [35] Techniques of Malware Detection: Research Review
    Baghirov, Elshan
    2021 IEEE 15TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT2021), 2021,
  • [36] A Comprehensive Review on Malware Detection Approaches
    Aslan, Omer
    Samet, Refik
    IEEE ACCESS, 2020, 8 : 6249 - 6271
  • [37] A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing
    Alrammal, Muath
    Naveed, Munir
    Sallam, Suzan
    Tsaramirsis, Georgios
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (07): : 1651 - 1661
  • [38] Framework for malware analysis in Android
    Urcuqui Lopez, Christian Camilo
    Navarro Cadavid, Andres
    SISTEMAS & TELEMATICA, 2016, 14 (37): : 45 - 56
  • [39] The Analysis of Android Malware Behaviors
    Fan Yuhui
    Xu Ning
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 335 - 345
  • [40] Malware analysis for windows administrators
    Carvey, Harlan
    DIGITAL INVESTIGATION, 2005, 2 (01) : 19 - 22