Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive toolset for detecting vulnerabilities in binary iOS applications in this conference talk from Recon 2017 Brussels. Learn about a four-step analysis workflow that includes downloading and decrypting iOS apps from the App Store, decompiling applications using LLVM as the intermediate representation language, performing static analysis to identify common vulnerabilities, and generating human-readable pseudocode. Discover how the toolset handles Objective-C and Swift applications, reconstructs program semantics, and utilizes runtime type information. See real-world examples of common security flaws and how they can be identified using this advanced analysis engine.