Εμφάνιση απλής εγγραφής

dc.contributor.advisorΠατσάκης, Κωνσταντίνος
dc.contributor.authorΒλάχος, Κωνσταντίνος Γ.
dc.contributor.authorVlachos, Konstantinos G.
dc.date.accessioned2017-12-22T06:52:35Z
dc.date.available2017-12-22T06:52:35Z
dc.date.issued2017-11-20
dc.identifier.urihttps://dione.lib.unipi.gr/xmlui/handle/unipi/10363
dc.format.extent59el
dc.language.isoenel
dc.publisherΠανεπιστήμιο Πειραιώςel
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Διεθνές*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.titleiOS application security analysisel
dc.typeMaster Thesisel
dc.contributor.departmentΣχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών. Τμήμα Πληροφορικήςel
dc.description.abstractENThe purpose of this research is to explain the nature of the Apple iOS applications and provide all the available Open Source tools for analyzing them, starting from decrypting any application’s binary downloaded from the AppStore to reverse engineering it and even altering the flow of its running process on the actual device. We start introducing the basic theory of the iOS operating system and its applications including the security mechanisms incorporated by Apple that are also the main targets of every iOS exploit or jailbreak developer. The next step is to describe the process of setting up the testing environment with a Macintosh OS and the Xcode IDE and/or an actual jailbroken iOS device (iPhone, iPad, iPod). The rest of the chapters describe the installation and usage of tools to implement the whole application security analysis procedure, starting from static to dynamic analysis, after having decrypted and reverse engineered the application’s binary and even interacting in an unplanned manner with the running process to change its method calls or arguments. A walk through on Data Protection on iOS follows, describing possible ways of data leakage on such devices. Finally, a chapter is dedicated to further in-depth explanation of important technical terms used throughout the whole document. The dissertation concludes, in the last phase. In this chapter, it is being assumed that for every step in application security analysis on the iOS platform the appropriate tools have been provided in this document. Further suggestions for research are being provided for those interested too.el
dc.contributor.masterΠληροφορικήel
dc.subject.keywordApplication softwareel
dc.subject.keywordApple Inc.el
dc.subject.keywordApple iOS applicationsel
dc.subject.keywordiOSel
dc.subject.keywordSecurity policyel
dc.subject.keywordData protectionel


Αρχεία σε αυτό το τεκμήριο

Thumbnail

Αυτό το τεκμήριο εμφανίζεται στις ακόλουθες συλλογές

Εμφάνιση απλής εγγραφής

Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές
Εκτός από όπου διευκρινίζεται διαφορετικά, το τεκμήριο διανέμεται με την ακόλουθη άδεια:
Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές

Βιβλιοθήκη Πανεπιστημίου Πειραιώς
Επικοινωνήστε μαζί μας
Στείλτε μας τα σχόλιά σας
Created by ELiDOC
Η δημιουργία κι ο εμπλουτισμός του Ιδρυματικού Αποθετηρίου "Διώνη", έγιναν στο πλαίσιο του Έργου «Υπηρεσία Ιδρυματικού Αποθετηρίου και Ψηφιακής Βιβλιοθήκης» της πράξης «Ψηφιακές υπηρεσίες ανοιχτής πρόσβασης της βιβλιοθήκης του Πανεπιστημίου Πειραιώς»