欢迎来到天天文库
浏览记录
ID:40389725
大小:2.44 MB
页数:54页
时间:2019-08-01
《iosapp-insecurity》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、WhitepaperiOSApplication(In)SecurityMay2012Preparedby:DominicChellE-Mail:research@mdsec.co.ukMDSecConsultingLtdiOSApplication(In)SecurityContents1.Introduction.........................................................................................42.Back
2、ground.........................................................................................52.1.iOSSecurityFeaturesPrimer...........................................................5CodeSigning...........................................................
3、...............................5ExploitMitigationFeatures.......................................................................5Sandboxing............................................................................................6Encryption.............
4、.................................................................................72.2.iOSApplicationOverview................................................................72.3.PreviousWork..................................................................
5、..............73.BlackBoxAssessment..........................................................................8Introduction...........................................................................................83.1.DecryptingAppStoreBinaries...........
6、...............................................83.2.LocatingthePositionIndependentExecutable.................................103.3.IdentifyingtheuseofStackSmashingProtection............................123.4.IdentifyingtheuseofAutomaticReferenceCounting...
7、....................123.5.InspectingtheBinary....................................................................133.6.ManipulatingtheRuntime..............................................................14Example:BypassingJailbreakDetection...............
8、...................................143.7.DefendingtheBinary....................................................................173.8.Conclusion........................................................................
此文档下载收益归作者所有
点击更多查看相关文章~~