{"title":"idb:黑盒iOS安全评估工具","authors":"D. Mayer","doi":"10.1145/2897073.2897710","DOIUrl":null,"url":null,"abstract":"Smartphones and mobile apps are increasingly used to manage and store sensitive data by both corporations and individuals. In this paper, common iOS mobile application flaws are reviewed as seen in real-world applications. For each type of flaw, defenses are recommended and it is shown how the author's tool 'idb' can be used to efficiently test for a range of these application flaws. The idb tool is open source and available to the public.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"idb: A Tool for Blackbox iOS Security Assessments\",\"authors\":\"D. Mayer\",\"doi\":\"10.1145/2897073.2897710\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Smartphones and mobile apps are increasingly used to manage and store sensitive data by both corporations and individuals. In this paper, common iOS mobile application flaws are reviewed as seen in real-world applications. For each type of flaw, defenses are recommended and it is shown how the author's tool 'idb' can be used to efficiently test for a range of these application flaws. The idb tool is open source and available to the public.\",\"PeriodicalId\":296509,\"journal\":{\"name\":\"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2897073.2897710\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2897073.2897710","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Smartphones and mobile apps are increasingly used to manage and store sensitive data by both corporations and individuals. In this paper, common iOS mobile application flaws are reviewed as seen in real-world applications. For each type of flaw, defenses are recommended and it is shown how the author's tool 'idb' can be used to efficiently test for a range of these application flaws. The idb tool is open source and available to the public.