Explore a comprehensive toolset for detecting vulnerabilities in binary iOS applications in this conference talk from Recon 2017 Brussels. Learn about a four-step analysis workflow that includes downloading and decrypting iOS apps from the App Store, decompiling applications using LLVM as the intermediate representation language, performing static analysis to identify common vulnerabilities, and generating human-readable pseudocode. Discover how the toolset handles Objective-C and Swift applications, reconstructs program semantics, and utilizes runtime type information. See real-world examples of common security flaws and how they can be identified using this advanced analysis engine.
Overview
Syllabus
Recon 2017 Brussels - Analyzing iOS apps: road from AppStore to security analysis report
Taught by
Recon Conference