Research on Offense and Defense Technology for iOS Kernel Security Mechanism

被引:1
|
作者
Chu, Sijun [1 ]
Wu, Hao [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450000, Peoples R China
关键词
iOS kernel security mechanism; kernel integrity protection mechanism; ROP &shellcode; iOS security testing;
D O I
10.1063/1.5033796
中图分类号
O59 [应用物理学];
学科分类号
摘要
iOS is a strong and widely used mobile device system. Its annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Research on the design of computer network security defense system applying cloud computing technology
    Wang J.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [22] Research on Potential Security Hazards and Defense Technology Existing in Colleges and Universities' Campus Network
    Qin, Lina
    INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND INTELLECTUALIZATION (ICEITI 2016), 2016, : 524 - 530
  • [23] Research on Security Mechanism of Power Intranet Based on Data Mining Technology
    Luo Zhenyu
    PROCEEDINGS OF 2021 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS '21), 2021,
  • [24] Information Security Attack-defense Research Based on The Military Balance Operation Mechanism
    Tian, Hongjun
    Yang, Dongsheng
    Wang, Lei
    Wu, Qidi
    2015 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2015, : 31 - 35
  • [25] RESEARCH AND TECHNOLOGY FOR STRATEGIC DEFENSE
    RANKINE, RR
    AEROSPACE AMERICA, 1984, 22 (04) : 64 - &
  • [26] Summary of Smart Grid Technology and Research on Smart Grid Security Mechanism
    Zou Minghan
    Miao Yun
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [27] AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler?
    Benzaid, Chafika
    Taleb, Tarik
    IEEE NETWORK, 2020, 34 (06): : 140 - 147
  • [29] A study on the coordinating defense mechanism of security robots
    Chang, Ho-Yu
    Chang, An-shih
    IECON 2007: 33RD ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-3, CONFERENCE PROCEEDINGS, 2007, : 461 - 464
  • [30] Evolving Defense Mechanism for Future Network Security
    Zhou, Haifeng
    Wu, Chunming
    Jiang, Ming
    Zhou, Boyang
    Gao, Wen
    Pan, Tingting
    Huang, Min
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (04) : 45 - 51