Review of iOS Malware Analysis

被引:1
|
作者
Zhu Yixiang [1 ]
Zhang Kang [2 ]
机构
[1] China Telecom Corp Ltd, Shanghai Res Inst, Natl Engn Lab Mobile Internet Syst & Applicat Sec, Shanghai, Peoples R China
[2] China Telecom Corp Ltd, Shanghai Branch, Informat Network Dept, Shanghai, Peoples R China
关键词
iOS security; malicious code; malicious application;
D O I
10.1109/DSC.2017.104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security architecture and distribution of iOS was introduced. The threats to user's data security and privacy from iOS malicious applications were analyzed. The reasons that the number of iOS malicious applications is less than Android malicious applications were discussed. The attacking methods of emerging iOS malicious applications were summed up. And prospect for future mitigation and confrontation strategies was given.
引用
收藏
页码:511 / 515
页数:5
相关论文
共 50 条
  • [41] Android Platform Malware Analysis
    Alfalqi, Khalid
    Alghamdi, Rubayyi
    Waqdan, Mofareh
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (01) : 140 - 146
  • [42] Undecidable Problems in Malware Analysis
    Selcuk, Ali Aydin
    Orhan, Fatih
    Batur, Berker
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 494 - 497
  • [43] Behavior Abstraction in Malware Analysis
    Beaucamps, Philippe
    Gnaedig, Isabelle
    Marion, Jean-Yves
    RUNTIME VERIFICATION, 2010, 6418 : 168 - 182
  • [44] iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
    Liu, Jigang
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2011, 6 (04) : 63 - 66
  • [45] Analysis of Malware Propagation in Twitter
    Sanzgiri, Ameya
    Hughes, Andrew
    Upadhyaya, Shambhu
    2013 IEEE 32ND INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2013), 2013, : 195 - 204
  • [46] Hybrid Analysis and Control of Malware
    Roundy, Kevin A.
    Miller, Barton P.
    RECENT ADVANCES IN INTRUSION DETECTION, 2010, 6307 : 317 - 338
  • [47] A basic malware analysis method
    Kara I.
    Computer Fraud and Security, 2019, 2019 (06): : 11 - 19
  • [48] The analysis of android malware behaviors
    Department of Computer and Information Engineering, Huainan Normal University, Huainan, China
    Int. J. Secur. Appl., 3 (335-346):
  • [49] Analysis and Impact of IoT Malware
    Margolis, Joel
    Oh, Tae
    Jadhav, Suyash
    Jeong, Jaehoon
    Kim, Young Ho
    Kim, Jeong Neyo
    PROCEEDINGS OF THE 18TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION (SIGITE'17), 2017, : 187 - 187
  • [50] Analysis of Malware Network Activity
    Berger-Sabbatel, Gilles
    Duda, Andrzej
    MULTIMEDIA COMMUNICATIONS, SERVICES, AND SECURITY, 2011, 149 : 207 - 215