Overview
Syllabus
Introduction
iOS Mobile App Security (MAS) Elevator Pitch
Hacking and Jailbreaking ios Attacks and weaknesses are well documented
Recent iOS App Coding and OS Reported Vulnerabilities
Standard iOS Application Today
Research Idea: IMAS Secure Application Framework
iOS Security Architecture
IMAS App Security "trade-space" Comparison Mar 2014
IMAS - Security Controls Device Access
Github: project-imas.github.io 13 Controls
IMAS - Encrypted Core Data (ECD) em
Encrypted Core Data Additional iMAS Support
Multi-compiler Based on work out of UC Irvine by Michael Franz and Per Larsen . Produces different binaries each compile • Static analysis and ROP exploits must account for variations
System Monitor - Monitor all device processes and network calls at the kernel level - Filtering tools to find and react to developer defined system events -IMAS provides direct programmatic app integration
Memory Security Allows encryption, wiping, and checksums of objects in memory - Provides function address space validation Application Start
File Shredding
IMAS Sentry Application Add to existing Apple deployed devices • Jailbreak and Debugger Detection
Prior Research Focus - modifying ELF structures
iOS Static App Attacks
Static App Attacks Process
Code Injection and Binary Patching
Consequences of Static Attacks
Encrypted Code Modules (ECM) WHAT?
IMAS Encrypted Code Modules (ECM) Summary
ECM - Encrypted Code Modules Concept 2/3
Build Summary
App Startup
Validating Integrity
ECM Advantages
Taught by
OWASP Foundation