Research on Offense and Defense Technology for iOS Kernel Security Mechanism

被引:1
|
作者
Chu, Sijun [1 ]
Wu, Hao [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450000, Peoples R China
关键词
iOS kernel security mechanism; kernel integrity protection mechanism; ROP &shellcode; iOS security testing;
D O I
10.1063/1.5033796
中图分类号
O59 [应用物理学];
学科分类号
摘要
iOS is a strong and widely used mobile device system. Its annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] In defense of offense: information security research under the right to science
    van Daalen, Ot
    COMPUTER LAW & SECURITY REVIEW, 2022, 46
  • [2] Computer network security and defense technology research
    Wang Qing
    Chen Hongju
    PROCEEDINGS 2016 EIGHTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION ICMTMA 2016, 2016, : 155 - 157
  • [3] Research of LAN Security Attack and Defense Technology
    Peng, Ying
    Wang, Rongfu
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 239 - 242
  • [4] Research on the technology of iOS jailbreak
    Liu, Feng
    Liu, Ke-sheng
    Chang, Chao
    Wang, Yan
    PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 644 - 647
  • [5] Analysis and research on iOS security system
    Zheng, Ling
    Li, Dandan
    Advances in Energy, Environment and Materials Science - Proceedings of the International Conference on Energy, Environment and Materials Science, EEMS 2015, 2016, : 751 - 755
  • [6] Analysis and research on iOS security system
    Zheng, Ling
    Li, Dandan
    ADVANCES IN ENERGY, ENVIRONMENT AND MATERIALS SCIENCE, 2016, : 751 - 755
  • [7] Offense-Defense Balance, War Duration, and the Security Dilemma
    Nilsson, Marco
    JOURNAL OF CONFLICT RESOLUTION, 2012, 56 (03) : 467 - 489
  • [8] Hardware Security Kernel for Cyber Defense
    Jungwirth, Patrick
    Ross, James
    Secrest, Barry
    Barnett, Thomas
    Chan, Philip
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES II, 2019, 11013
  • [9] Review on Security Defense Technology Research in Edge Computing Environment
    Shang, Ke
    He, Weizhen
    Zhang, Shuai
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (01) : 1 - 18
  • [10] Review on Security Defense Technology Research in Edge Computing Environment
    Ke SHANG
    Weizhen HE
    Shuai ZHANG
    Chinese Journal of Electronics, 2024, 33 (01) : 1 - 18