메뉴 건너뛰기




Volumn 74, Issue , 2017, Pages 366-374

A technique to circumvent SSL/TLS validations on iOS devices

Author keywords

Certificate and public key validation; iOS security; MiTM; OpenSSL; Security; SSL pinning

Indexed keywords

IOS (OPERATING SYSTEM); PUBLIC KEY CRYPTOGRAPHY; SOCIAL SCIENCES COMPUTING;

EID: 84994744881     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2016.08.019     Document Type: Article
Times cited : (36)

References (41)
  • 1
    • 85019808720 scopus 로고    scopus 로고
    • VeriSign issues false Microsoft digital certificates, 23 March, IT World Canada, viewed 22 March 2016
    • B. Fonseca, VeriSign issues false Microsoft digital certificates, 23 March, IT World Canada, viewed 22 March 2016, 2001. http://www.itworldcanada.com/article/verisign-issues-false-microsoft-digital-certificates/30200.
    • (2001)
    • Fonseca, B.1
  • 2
    • 85019787849 scopus 로고    scopus 로고
    • Adobe code signing infrastructure hacked by ‘sophisticated threat actors’
    • 27 September, ZDNet, viewed 9 March 2016
    • R. Naraine, Adobe code signing infrastructure hacked by ‘sophisticated threat actors’, 27 September, ZDNet, viewed 9 March 2016, 2012. http://www.zdnet.com/article/adobe-code-signing-infrastructure-hacked-by-sophisticated-threat-actors/.
    • (2012)
    • Naraine, R.1
  • 3
    • 84894178327 scopus 로고    scopus 로고
    • Digital certificates and malware: a dangerous mix
    • 4 February, Malwarebytes LABS, viewed 9 March 2016
    • J. Segura, Digital certificates and malware: a dangerous mix, 4 February, Malwarebytes LABS, viewed 9 March 2016, 2013. https://blog.malwarebytes.org/intelligence/2013/02/digital-certificates-and-malware-a-dangerous-mix/.
    • (2013)
    • Segura, J.1
  • 4
    • 85019780557 scopus 로고    scopus 로고
    • VeriSign working to mitigate Stuxnet digital signature theft
    • 21 July, The Tech Herald, viewed 9 March 2016
    • S. Ragan, VeriSign working to mitigate Stuxnet digital signature theft, 21 July, The Tech Herald, viewed 9 March 2016, 2010. http://www.thetechherald.com/articles/VeriSign-working-to-mitigate-Stuxnet-digital-signature-theft/10818/.
    • (2010)
    • Ragan, S.1
  • 11
    • 85019775650 scopus 로고    scopus 로고
    • Solo Iranian hacker takes credit for Comodo certificate attack
    • 27 March, Computerworld, viewed 13 March 2016
    • G. Keizer, Solo Iranian hacker takes credit for Comodo certificate attack, 27 March, Computerworld, viewed 13 March 2016, 2011. http://www.computerworld.com/article/2507258/security0/solo-iranian-hacker-takes-credit-for-comodo-certificate-attack.html.
    • (2011)
    • Keizer, G.1
  • 14
    • 85019827840 scopus 로고    scopus 로고
    • Uber's App is Anything but Malware, 10 December, BETTER, viewed 10 March 2016
    • W. Clark, Uber's App is Anything but Malware, 10 December, BETTER, viewed 10 March 2016, 2014. http://better.mobi/2014/12/10/ubers-app-is-anything-but-malware/.
    • (2014)
    • Clark, W.1
  • 15
    • 85019780827 scopus 로고    scopus 로고
    • Defeat SSL Certificate Validation for Google Android Applications
    • McAfee, viewed 16 March 2016
    • N. Rudrappa, Defeat SSL Certificate Validation for Google Android Applications, McAfee, viewed 16 March 2016, 2013. http://www.mcafee.com/us/resources/white-papers/wp-defeating-ssl-cert-validation.pdf.
    • (2013)
    • Rudrappa, N.1
  • 16
    • 85019780954 scopus 로고    scopus 로고
    • Bypassing SSL Pinning on Android via Reverse Engineering, Security-assessment.com, viewed 16 March 2016
    • D. Andzakovic, Bypassing SSL Pinning on Android via Reverse Engineering, Security-assessment.com, viewed 16 March 2016, 2014. http://security-assessment.com/files/documents/whitepapers/Bypassing%20SSL%20Pinning%20on%20Android%20via%20Reverse%20Engineering.pdf.
    • (2014)
    • Andzakovic, D.1
  • 18
    • 85019798591 scopus 로고    scopus 로고
    • Bypass OpenSSL Certificate Pinning on iOS, 7 January, NCC Group, viewed 15 March 2016
    • D. Mayer, Bypass OpenSSL Certificate Pinning on iOS, 7 January, NCC Group, viewed 15 March 2016, 2015. https://www.nccgroup.trust/globalassets/newsroom/us/blog/documents/2015/01/bypassing_openssl_pinning.pdf.
    • (2015)
    • Mayer, D.1
  • 21
    • 84881218966 scopus 로고    scopus 로고
    • SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements, in: Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, pp.
    • J. Clark, P.C. Van Oorschot, SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements, in: Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, 2013, pp. 511–525.
    • (2013) , pp. 511-525
    • Clark, J.1    Van Oorschot, P.C.2
  • 27
    • 84961351749 scopus 로고    scopus 로고
    • Malicious sequential pattern mining for automatic malware detection
    • Fan, Y., Ye, Y., Chen, L., Malicious sequential pattern mining for automatic malware detection. Expert Syst. Appl. 52 (2016), 16–25, 10.1016/j.eswa.2016.01.002.
    • (2016) Expert Syst. Appl. , vol.52 , pp. 16-25
    • Fan, Y.1    Ye, Y.2    Chen, L.3
  • 28
    • 84975230776 scopus 로고    scopus 로고
    • A probabilistic discriminative model for Android Malware detection with decompiled source code
    • Cen, L., Gates, C.S., Si, L., Li, N., A probabilistic discriminative model for Android Malware detection with decompiled source code. IEEE Trans. Dependable Secure Comput. 12:4 (2015), 400–412.
    • (2015) IEEE Trans. Dependable Secure Comput. , vol.12 , Issue.4 , pp. 400-412
    • Cen, L.1    Gates, C.S.2    Si, L.3    Li, N.4
  • 29
    • 85019824808 scopus 로고    scopus 로고
    • Revealed: how US and UK spy agencies defeat Internet privacy and security, 6 September, The Guardian, viewed 25 July 2016
    • J. Ball, J. Borger, G. Greenwald, Revealed: how US and UK spy agencies defeat Internet privacy and security, 6 September, The Guardian, viewed 25 July 2016, 2013. https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security.
    • (2013)
    • Ball, J.1    Borger, J.2    Greenwald, G.3
  • 30
    • 85019802055 scopus 로고    scopus 로고
    • Trustwave admits issuing man-in-the-middle digital certificate, Mozilla debates punishment, 9 February, PC World, viewed 25 July 2016
    • L. Constantin, Trustwave admits issuing man-in-the-middle digital certificate, Mozilla debates punishment, 9 February, PC World, viewed 25 July 2016, 2012. http://www.pcworld.idg.com.au/article/414755/trustwave_admits_issuing_man-in-the-middle_digital_certificate_mozilla_debates_punishment/.
    • (2012)
    • Constantin, L.1
  • 31
    • 85019817355 scopus 로고    scopus 로고
    • Managing SSL/TLS Traffic Flows, viewed 25 July 2016
    • Cisco Systems, Inc., Managing SSL/TLS Traffic Flows, viewed 25 July 2016, 2013. http://www.cisco.com/c/en/us/td/docs/security/asacx/9-1/user/guide/b_User_Guide_for_ASA_CX_and_PRSM_9_1/b_User_Guide_for_ASA_CX_and_PRSM_9_1_chapter_01101.pdf.
    • (2013)
    • Cisco Systems, Inc.,1
  • 32
    • 85019819820 scopus 로고    scopus 로고
    • IBM Security QRadar Incident Forensics, viewed 25 July 2016
    • IBM Corporation, IBM Security QRadar Incident Forensics, viewed 25 July 2016, 2014. http://www-03.ibm.com/software/products/en/qradar-incident-forensics.
    • (2014)
    • Corporation, I.B.M.1
  • 33
    • 84979828898 scopus 로고    scopus 로고
    • A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities
    • Wu, J., Ota, K., Dong, M., Li, C., A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access 4 (2016), 416–424.
    • (2016) IEEE Access , vol.4 , pp. 416-424
    • Wu, J.1    Ota, K.2    Dong, M.3    Li, C.4
  • 34
    • 84953364314 scopus 로고    scopus 로고
    • NetSecCC: A scalable and fault-tolerant architecture for cloud computing security
    • He, J., Dong, M., Ota, K., Fan, M., Wang, G., NetSecCC: A scalable and fault-tolerant architecture for cloud computing security. Peer-to-Peer Netw. Appl. 9:1 (2016), 67–81.
    • (2016) Peer-to-Peer Netw. Appl. , vol.9 , Issue.1 , pp. 67-81
    • He, J.1    Dong, M.2    Ota, K.3    Fan, M.4    Wang, G.5
  • 35
    • 84937692362 scopus 로고    scopus 로고
    • Identity-based signcryption from lattices
    • Yan, J., Wang, L., Dong, M., Yang, Y., Yao, W., Identity-based signcryption from lattices. Secur. Commun. Netw. 8:18 (2015), 3751–3770.
    • (2015) Secur. Commun. Netw. , vol.8 , Issue.18 , pp. 3751-3770
    • Yan, J.1    Wang, L.2    Dong, M.3    Yang, Y.4    Yao, W.5
  • 36
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat landscape: Challenges and future research directions
    • Choo, K.-K.R., The cyber threat landscape: Challenges and future research directions. Comput. Secur. 30:8 (2011), 719–731.
    • (2011) Comput. Secur. , vol.30 , Issue.8 , pp. 719-731
    • Choo, K.-K.R.1
  • 37
    • 84905834871 scopus 로고    scopus 로고
    • A conceptual interdisciplinary plug-and-play cyber security framework
    • H. Kaur X. Tao Springer New York, USA
    • Choo, K.-K.R., A conceptual interdisciplinary plug-and-play cyber security framework. Kaur, H., Tao, X., (eds.) ICTs and the Millennium Development Goals–A United Nations Perspective, 2014, Springer, New York, USA, 81–99.
    • (2014) ICTs and the Millennium Development Goals–A United Nations Perspective , pp. 81-99
    • Choo, K.-K.R.1
  • 38
    • 85020892568 scopus 로고    scopus 로고
    • Forensic data acquisition from cloud-of-things devices: Windows smartphones as a case study
    • (in press)
    • Cahyani, N.D.W., Martini, B., Choo, K.-K.R., Al-Azhar, M.H., Forensic data acquisition from cloud-of-things devices: Windows smartphones as a case study. Concurr. Comput.: Pract. Exper., 2016, 10.1002/cpe.3855 (in press).
    • (2016) Concurr. Comput.: Pract. Exper.
    • Cahyani, N.D.W.1    Martini, B.2    Choo, K.-K.R.3    Al-Azhar, M.H.4
  • 39
    • 85018406878 scopus 로고    scopus 로고
    • Data exfiltration from Internet of things devices: iOS devices as case studies
    • (in press)
    • D'Orazio, C.J., Choo, K.-K.R., Yang, L.T., Data exfiltration from Internet of things devices: iOS devices as case studies. IEEE Internet Things J., 2016, 10.1109/JIOT.2016.2569094 (in press).
    • (2016) IEEE Internet Things J.
    • D'Orazio, C.J.1    Choo, K.-K.R.2    Yang, L.T.3
  • 40
    • 84971378672 scopus 로고    scopus 로고
    • Is the data on your wearable device secure? An Android wear smartwatch case study
    • (in press)
    • Do, Q., Martini, B., Choo, K.-K.R., Is the data on your wearable device secure? An Android wear smartwatch case study. Softw.: Pract. Exp., 2016, 10.1002/spe.2414 (in press).
    • (2016) Softw.: Pract. Exp.
    • Do, Q.1    Martini, B.2    Choo, K.-K.R.3
  • 41
    • 84933063177 scopus 로고    scopus 로고
    • Vetting the Security of Mobile Applications, NIST Special Publication 800-163, viewed 17 March 2016
    • S. Quirolgico, J. Voas, T. Karygiannis, C. Michael, K. Scarfone, Vetting the Security of Mobile Applications, NIST Special Publication 800-163, viewed 17 March 2016, 2015. http://dx.doi.org/10.6028/NIST.SP.800-163.
    • (2015)
    • Quirolgico, S.1    Voas, J.2    Karygiannis, T.3    Michael, C.4    Scarfone, K.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.