PiOS : Detecting privacy leaks in iOS applications

作者: Manuel Egele , Christopher Kruegel , Engin Kirda , Giovanni Vigna

DOI:

关键词:

摘要: With the introduction of Apple’s iOS and Google’s Android operating systems, sales smartphones have exploded. These become powerful devices that are basically miniature versions personal computers. However, growing popularity sophistication also increased concerns about privacy users who operate these devices. been exacerbated by fact it has increasingly easy for to install execute third-party applications. To protect its from malicious applications, Apple introduced a vetting process. This process should ensure all applications conform (privacy) rules before they can be offered via App Store. Unfortunately, this is not welldocumented, there cases where had removed Store after

参考文章(12)
V. Benjamin Livshits, Monica S. Lam, Finding security vulnerabilities in java applications with static analysis usenix security symposium. pp. 18- 18 ,(2005)
Mihai Christodorescu, Somesh Jha, Static analysis of executables to detect malicious patterns usenix security symposium. pp. 12- 12 ,(2003) , 10.21236/ADA449067
Engin Kirda, Christopher Kruegel, Darren Mutz, Giovanni Vigna, William Robertson, Automating mimicry attacks using static binary analysis usenix security symposium. pp. 11- 11 ,(2005)
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
N. Jovanovic, C. Kruegel, E. Kirda, Pixy: a static analysis tool for detecting Web application vulnerabilities ieee symposium on security and privacy. pp. 258- 263 ,(2006) , 10.1109/SP.2006.29
Avik Chaudhuri, Language-based security on Android Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security - PLAS '09. pp. 1- 7 ,(2009) , 10.1145/1554339.1554341
Brad Calder, Dirk Grunwald, Reducing indirect function call overhead in C++ programs symposium on principles of programming languages. pp. 397- 408 ,(1994) , 10.1145/174675.177973
William Enck, Machigar Ongtang, Patrick McDaniel, Understanding Android Security ieee symposium on security and privacy. ,vol. 7, pp. 50- 57 ,(2009) , 10.1109/MSP.2009.26
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu Sridharan, Omri Weisman, TAJ Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation - PLDI '09. ,vol. 44, pp. 87- 97 ,(2009) , 10.1145/1542476.1542486
M. Christodorescu, S. Jha, S.A. Seshia, D. Song, R.E. Bryant, Semantics-aware malware detection ieee symposium on security and privacy. pp. 32- 46 ,(2005) , 10.1109/SP.2005.20