메뉴 건너뛰기




Volumn 293, Issue , 2017, Pages 523-544

A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps

Author keywords

iOS device vulnerability; Mobile device vulnerability; Mobile security and privacy; Mobile threats; Vulnerability discovery; Vulnerability exploitation

Indexed keywords

COPYRIGHTS; DIGITAL DEVICES; HEALTH INSURANCE; IOS (OPERATING SYSTEM); MOBILE DEVICES; RISK ASSESSMENT;

EID: 84986550725     PISSN: 00963003     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.amc.2016.08.051     Document Type: Article
Times cited : (27)

References (68)
  • 1
    • 84986544610 scopus 로고    scopus 로고
    • SANS institute
    • viewed 17th July 2105
    • [1] Johnson, K., Jardine, K., SANS institute. Mob. Appl. Secur. Surv., 2013 viewed 17th July 2105 http://www.sans.org/reading-room/whitepapers/analyst/2013-mobile-application-security-survey-35080.
    • (2013) Mob. Appl. Secur. Surv.
    • Johnson, K.1    Jardine, K.2
  • 2
    • 84986633572 scopus 로고    scopus 로고
    • (), Threats to Mobile Apps in the Wild. (accessed 17.07.15).
    • [2] ARXAN (2013), Threats to Mobile Apps in the Wild. https://www.arxan.com/wp-content/uploads/2015/01/Threats_to_Mobile_Apps_in_the_Wild_v0.3.pdf (accessed 17.07.15).
    • (2013)
  • 3
    • 84898003401 scopus 로고    scopus 로고
    • Identifying back doors, attack points, and surveillance mechanisms in iOS devices
    • [3] Zdziarski, J., Identifying back doors, attack points, and surveillance mechanisms in iOS devices. Digit. Investig. 11:1 (2014), 3–19.
    • (2014) Digit. Investig. , vol.11 , Issue.1 , pp. 3-19
    • Zdziarski, J.1
  • 4
    • 84986621020 scopus 로고    scopus 로고
    • (), HHP Research Reveals Nine out of 10 Mobile Applications Vulnerable to Attack, (accessed 17.07.15).
    • [4] HP (2013), HP Research Reveals Nine out of 10 Mobile Applications Vulnerable to Attack, http://www8.hp.com/us/en/hp-news/press-release.html?id=1528865 (accessed 17.07.15).
    • (2013)
  • 5
    • 84986574264 scopus 로고    scopus 로고
    • (), iOS Security, (accessed 17.07.15).
    • [5] Apple (2015), iOS Security, https://www.apple.com/business/docs/iOS_Security_Guide.pdf (accessed 17.07.15).
    • (2015)
  • 6
    • 84986574263 scopus 로고    scopus 로고
    • (), Apple CommonCryptor Open Source, (accessed 17.07.15).
    • [6] Apple (2006), Apple CommonCryptor Open Source, http://www.opensource.apple.com/source/CommonCrypto/CommonCrypto-36064/CommonCrypto/CommonCryptor.h (accessed 17.07.15).
    • (2006)
  • 7
    • 84986621024 scopus 로고    scopus 로고
    • (), CCCrypt Mac Developer Library Reference, (accessed 17.07.15).
    • [7] Apple (2007), CCCrypt Mac Developer Library Reference, https://developer.apple.com/library/ios/documentation/System/Conceptual/ManPages_iPhoneOS/man3/CCCrypt.3cc.html (accessed 17.07.15).
    • (2007)
  • 8
    • 84986582445 scopus 로고    scopus 로고
    • (), CCHmac Mac Developer Library Reference, (accessed 17.07.15).
    • [8] Apple (2007), CCHmac Mac Developer Library Reference, https://developer.apple.com/library/mac/documentation/Darwin/Reference/ManPages/man3/CCHmac.3cc.html (accessed 17.07.15).
    • (2007)
  • 9
    • 84986594434 scopus 로고    scopus 로고
    • (), CFString CoreFoundation Framework Reference, (accessed 17.07.15).
    • [9] Apple (2012), CFString CoreFoundation Framework Reference, https://developer.apple.com/library/mac/documentation/CoreFoundation/Reference/CFStringRef/Reference/reference.html (accessed 17.07.15).
    • (2012)
  • 10
    • 84986574238 scopus 로고    scopus 로고
    • (), TLS heartbeat read overrun (CVE-2014-0160), (accessed 17.07.15).
    • [10] OpenSSL Security Advisory (2014), TLS heartbeat read overrun (CVE-2014-0160), http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 (accessed 17.07.15).
    • (2014)
  • 11
    • 84986574251 scopus 로고    scopus 로고
    • OWASP. Certificate and Public Key Pinning, (accessed 17.07.15).
    • [11] J. Walton and J. Steven, OWASP (2014), Certificate and Public Key Pinning, https://www.owasp.org/index.php/Certificate_and_Public_Key_Pinning (accessed 17.07.15).
    • (2014)
    • Walton, J.1    Steven, J.2
  • 12
    • 84986541778 scopus 로고    scopus 로고
    • Forbes
    • Evasi0n Is The Most Popular Jailbreak Ever, (accessed 17.07.15).
    • [12] A. Greenberg, Forbes (2013), Evasi0n Is The Most Popular Jailbreak Ever, http://www.forbes.com/sites/andygreenberg/2013/02/08/evasi0n-is-the-most-popular-jailbreak-ever-nearly-seven-million-ios-devices-hacked-in-four-days/ (accessed 17.07.15).
    • (2013)
    • Greenberg, A.1
  • 13
    • 84949105226 scopus 로고    scopus 로고
    • The Mobile Application Market
    • accessed 17.07.15).
    • [13] J. Svanberg, B. Insight (2013), The Mobile Application Market, http://www.berginsight.com/ReportPDF/ProductSheet/bi-app1-ps.pdf (accessed 17.07.15).
    • (2013)
    • Svanberg, J.1    Insight, B.2
  • 14
    • 84986593416 scopus 로고    scopus 로고
    • (), Marble Labs Mobile threat Report, (accessed 17.07.15).
    • [14] Marble Security (2014), Marble Labs Mobile threat Report, http://www.marblesecurity.com/wp-content/uploads/2015/06/MS_App-Threat-Report_June-2014.pdf (accessed 17.07.15).
    • (2014)
  • 17
    • 78649242475 scopus 로고    scopus 로고
    • Transport Layer Security (TLS) Renegotiation Indication Extension
    • RFC 5746, (accessed 17.07.15).
    • [17] E. Rescorla, M. Ray, S. Dispensa, and N. Oskov (2010), Transport Layer Security (TLS) Renegotiation Indication Extension, http://tools.ietf.org/html/rfc5746 RFC 5746, (accessed 17.07.15).
    • (2010)
    • Rescorla, E.1    Ray, M.2    Dispensa, S.3    Oskov, N.4
  • 18
    • 84986593054 scopus 로고    scopus 로고
    • (), Hackers use ‘Find My iPhone’ to lockout, ransom Mac and iOS device owners in Australia, (accessed 17.07.15).
    • [18] Apple Insider (2014), Hackers use ‘Find My iPhone’ to lockout, ransom Mac and iOS device owners in Australia, http://appleinsider.com/articles/14/05/27/hackers-break-into-lock-macs-and-ios-devices-for-ransom-in-australia (accessed 17.07.15).
    • (2014)
  • 19
    • 84986594411 scopus 로고    scopus 로고
    • (), Mobile App Reputation Report,
    • [19] Appthority (2014), Mobile App Reputation Report,
    • (2014)
  • 23
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • [23] Dolev, D., Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory 29:2 (1983), 198–208.
    • (1983) IEEE Trans. Inf. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 25
    • 84919570761 scopus 로고    scopus 로고
    • Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
    • [25] Imgraben, J., Engelbrecht, A., Choo, K-K.R., Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behav. Inf. Technol. 33:12 (2014), 1347–1360.
    • (2014) Behav. Inf. Technol. , vol.33 , Issue.12 , pp. 1347-1360
    • Imgraben, J.1    Engelbrecht, A.2    Choo, K.-K.R.3
  • 27
    • 84986579876 scopus 로고    scopus 로고
    • iMAS, iOS Mobile Application Security, (accessed 17.07.15).
    • [27] iMAS, iOS Mobile Application Security, http://project-imas.github.io/ (accessed 17.07.15).
  • 28
    • 84986582456 scopus 로고    scopus 로고
    • (), Secure mobile application development reference, (accessed 17.07.15).
    • [28] Denim Groups (2011), Secure mobile application development reference, http://www.denimgroup.com/media/pdfs/MobileDevReference.pdf (accessed 17.07.15).
    • (2011)
  • 29
    • 84986574273 scopus 로고    scopus 로고
    • (), Best practices for secure mobile development, (accessed 17.07.15).
    • [29] viaForensics (2012), Best practices for secure mobile development, https://viaforensics.com/resources/reports/best-practices-ios-android-secure-mobile-development/ (accessed 17.07.15).
    • (2012)
  • 30
    • 84986582452 scopus 로고    scopus 로고
    • Smartphone secure development guidelines for app developers, (accessed 17
    • ENISA
    • [30] ENISA (2011), Smartphone secure development guidelines for app developers, http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/smartphone-security-1/smartphone-secure-development-guidelines/at_download/fullReport (accessed 17.07.15).
    • (2011)
  • 31
    • 84964515207 scopus 로고    scopus 로고
    • Inside the iOS/Adthief Malware
    • accessed 17.07.15).
    • [31] A. Apvrille (2014), Inside the iOS/Adthief Malware, https://www.virusbtn.com/pdf/magazine/2014/vb201408-AdThief.pdf (accessed 17.07.15).
    • (2014)
    • Apvrille, A.1
  • 32
    • 84986541795 scopus 로고    scopus 로고
    • (), Anti-phishing Technology, (accessed 17.07.15).
    • [32] Kaspersky Lab (2013), Anti-phishing Technology, http://docs.apwg.org/sponsors_technical_papers/Kaspersky_Lab_Whitepaper_Anti-Phishing_eng_final.pdf (accessed 17.07.15).
    • (2013)
  • 33
    • 84922992013 scopus 로고    scopus 로고
    • Mobile Threats and the Underground Marketplace
    • (accessed 17.07.15).
    • [33] APWG (2013), Mobile Threats and the Underground Marketplace, http://docs.apwg.org/reports/mobile/apwg_mobile_fraud_report_april_2013.pdf (accessed 17.07.15).
    • (2013)
  • 34
    • 84875157541 scopus 로고    scopus 로고
    • New payment methods: A review of 2010–2012 FATF mutual evaluation reports
    • [34] Choo, K-K.R., New payment methods: A review of 2010–2012 FATF mutual evaluation reports. Comput. Secur. 36 (2013), 12–26.
    • (2013) Comput. Secur. , vol.36 , pp. 12-26
    • Choo, K.-K.R.1
  • 35
    • 84892440021 scopus 로고    scopus 로고
    • A standard for developing secure mobile applications
    • [35] Dye, S.M., Scarfone, K., A standard for developing secure mobile applications. Comput. Stand. Interfaces 36:3 (2014), 524–530.
    • (2014) Comput. Stand. Interfaces , vol.36 , Issue.3 , pp. 524-530
    • Dye, S.M.1    Scarfone, K.2
  • 36
    • 84880504438 scopus 로고    scopus 로고
    • Guidelines for Managing the Security of Mobile Devices in the Enterprise
    • (accessed 17.07.15).
    • [36] NIST (2013), Guidelines for Managing the Security of Mobile Devices in the Enterprise, http://dx.doi.org/10.6028/NIST.SP.800-124r1 (accessed 17.07.15).
    • (2013)
  • 37
    • 85046632673 scopus 로고    scopus 로고
    • Technical Considerations for Vetting 3rd Party Mobile (Draft)
    • (accessed 17.07.15).
    • [37] NIST (2014), Technical Considerations for Vetting 3rd Party Mobile (Draft), http://csrc.nist.gov/publications/drafts/800-163/sp800_163_draft.pdf (accessed 17.07.15).
    • (2014)
  • 41
    • 84897594353 scopus 로고    scopus 로고
    • Detecting mobile malware threats to homeland security through static analysis
    • [41] Seo, S., Gupta, A., Sallam, AM., Bertino, E., Yim, K., Detecting mobile malware threats to homeland security through static analysis. J. Netw. Comput. Appl. 38 (2014), 43–53.
    • (2014) J. Netw. Comput. Appl. , vol.38 , pp. 43-53
    • Seo, S.1    Gupta, A.2    Sallam, A.M.3    Bertino, E.4    Yim, K.5
  • 43
    • 84986574297 scopus 로고    scopus 로고
    • Personal banking apps leak info through phone
    • accessed 17.07.15).
    • [43] A. Sánchez (2014), Personal banking apps leak info through phone,(accessed 17.07.15). http://blog.ioactive.com/2014/01/personal-banking-apps-leak-info-through.html?m=1.
    • (2014)
    • Sánchez, A.1
  • 45
    • 84952351561 scopus 로고    scopus 로고
    • Zed Attack Proxy Project
    • (accessed 17.07.15).
    • [45] OWASP (2015), Zed Attack Proxy Project, (accessed 17.07.15). https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project.
    • (2015)
  • 46
    • 84904808792 scopus 로고    scopus 로고
    • Dangerous Wi-Fi access point: attacks to benign smartphone applications
    • accessed 17.07.15) doi: >
    • [46] Park, M.W., Choi, Y.H., Eom, J.H., Chung, T.M., Dangerous Wi-Fi access point: attacks to benign smartphone applications. Pers. Ubiquitous Comput. 18:6 (2014), 1373–1386 accessed 17.07.15) doi: http://dx.doi.org/10.1007/s00779-013-0739-y >.
    • (2014) Pers. Ubiquitous Comput. , vol.18 , Issue.6 , pp. 1373-1386
    • Park, M.W.1    Choi, Y.H.2    Eom, J.H.3    Chung, T.M.4
  • 50
    • 84986592423 scopus 로고    scopus 로고
    • Samsung ‘Find My Mobile Flaw’
    • (vulnerability ID:CVE-2014-8346), (accessed 17.07.15)
    • [50] NIST (2014), Samsung ‘Find My Mobile Flaw’ (vulnerability ID:CVE-2014-8346), (accessed 17.07.15), http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8346.
    • (2014)
  • 52
    • 79960951090 scopus 로고    scopus 로고
    • Vetting mobile apps
    • accessed 17.07.15)
    • [52] Quirolgico, S., Voas, J., Kuhn, R., Vetting mobile apps. IT Prof. 13:4 (2011), 9–11 accessed 17.07.15).
    • (2011) IT Prof. , vol.13 , Issue.4 , pp. 9-11
    • Quirolgico, S.1    Voas, J.2    Kuhn, R.3
  • 53
    • 84986592438 scopus 로고    scopus 로고
    • Projects/OWASP Mobile Security Project – Top Ten Mobile Risks
    • (accessed 17.07.15)
    • [53] OWASP (2014), Projects/OWASP Mobile Security Project – Top Ten Mobile Risks, (accessed 17.07.15) https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks.
    • (2014)
  • 54
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Springer–Verlag vol. 1807/2000 of LNCS
    • [54] Bellare, M., Pointcheval, D., Rogaway, P., Authenticated key exchange secure against dictionary attacks. Proceedings of the 2000 EUROCRYPT, 2000, Springer–Verlag, 139–155 vol. 1807/2000 of LNCS.
    • (2000) Proceedings of the 2000 EUROCRYPT , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 56
    • 84890026492 scopus 로고    scopus 로고
    • Maintaining digital certificate security
    • accessed 17.07.15)
    • [56] A. Langley (2015), Maintaining digital certificate security, (accessed 17.07.15) http://googleonlinesecurity.blogspot.com.au/2015/03/maintaining-digital-certificate-security.html.
    • (2015)
    • Langley, A.1
  • 57
    • 84912008171 scopus 로고    scopus 로고
    • Exfiltrating data from Android devices
    • [57] Do, Q., Martini, B., Choo, K-K.R., Exfiltrating data from Android devices. Comput. Secur. 48 (2015), 74–91.
    • (2015) Comput. Secur. , vol.48 , pp. 74-91
    • Do, Q.1    Martini, B.2    Choo, K.-K.R.3
  • 58
    • 84949096402 scopus 로고    scopus 로고
    • An adversary model to evaluate DRM protection of video contents on iOS devices
    • [58] D'Orazio, C., Choo, K-K.R., An adversary model to evaluate DRM protection of video contents on iOS devices. Comput. Secur. 56 (2016), 94–110.
    • (2016) Comput. Secur. , vol.56 , pp. 94-110
    • D'Orazio, C.1    Choo, K.-K.R.2
  • 59
    • 84908256732 scopus 로고    scopus 로고
    • Beyond blacklisting: Cyberdefense in the era of advanced persistent threats
    • [59] Beuhring, A., Salous, K., Beyond blacklisting: Cyberdefense in the era of advanced persistent threats. IEEE Secur. Priv. 12:5 (2014), 90–93.
    • (2014) IEEE Secur. Priv. , vol.12 , Issue.5 , pp. 90-93
    • Beuhring, A.1    Salous, K.2
  • 60
    • 84985915910 scopus 로고    scopus 로고
    • Ransomware: A Growing Menace
    • Symantec, viewed 17th July 2015
    • [60] G. O'Gorman and G. McDonald, Symantec (2012), Ransomware: A Growing Menace, viewed 17th July 2015, http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/ransomware-a-growing-menace.pdf.
    • (2012)
    • O'Gorman, G.1    McDonald, G.2
  • 61
    • 84986592454 scopus 로고    scopus 로고
    • (), Apple iPhone, iPad iOS 9 security flaw lets malicious apps sneak onto enterprise devices, (accessed 14.06.16).
    • [61] ZDnet (2016), Apple iPhone, iPad iOS 9 security flaw lets malicious apps sneak onto enterprise devices, (accessed 14.06.16). http://www.zdnet.com/article/apple-iphone-ipad-ios-9-security-flaw-lets-malicious-apps-sneak-onto-enterprise-devices/.
    • (2016)
  • 62
    • 84986618437 scopus 로고    scopus 로고
    • (), How to Delete an App that has a Configuration Profile on your iPhone, iPad, or iPod Touch, (accessed 14.06.16).
    • [62] Apple (2015), How to Delete an App that has a Configuration Profile on your iPhone, iPad, or iPod Touch, (accessed 14.06.16). https://support.apple.com/en-au/HT205347.
    • (2015)
  • 64
    • 84947587045 scopus 로고    scopus 로고
    • A forensically sound adversary model for mobile devices
    • e0138449
    • [64] Do, Q., Martini, B., Choo, K-K.R., A forensically sound adversary model for mobile devices. PLOS ONE, 10(9), 2015, e0138449.
    • (2015) PLOS ONE , vol.10 , Issue.9
    • Do, Q.1    Martini, B.2    Choo, K.-K.R.3
  • 65
    • 84979891798 scopus 로고    scopus 로고
    • A data exfiltration and remote exploitation attack on consumer 3D printers
    • [65] Do, Q., Martini, B., Choo, K-K.R., A data exfiltration and remote exploitation attack on consumer 3D printers. IEEE Trans. Inf. Forensics Secure. 11:10 (2016), 2174–2186 http://dx.doi.org/10.1109/TIFS.2016.2578285.
    • (2016) IEEE Trans. Inf. Forensics Secure. , vol.11 , Issue.10 , pp. 2174-2186
    • Do, Q.1    Martini, B.2    Choo, K.-K.R.3
  • 66
    • 84971378672 scopus 로고    scopus 로고
    • “Is the data on your wearable device secure? An Android Wear smartwatch case study”
    • [66] Do, Q., Martini, B., Choo, K-K.R., “Is the data on your wearable device secure? An Android Wear smartwatch case study”. Softw. Pract. Exp., 2016 http://dx.doi.org/10.1002/spe.2414.
    • (2016) Softw. Pract. Exp.
    • Do, Q.1    Martini, B.2    Choo, K.-K.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.