Research on Offense and Defense Technology for iOS Kernel Security Mechanism

被引:1
|
作者
Chu, Sijun [1 ]
Wu, Hao [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450000, Peoples R China
关键词
iOS kernel security mechanism; kernel integrity protection mechanism; ROP &shellcode; iOS security testing;
D O I
10.1063/1.5033796
中图分类号
O59 [应用物理学];
学科分类号
摘要
iOS is a strong and widely used mobile device system. Its annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Research on iOS Application of Internal Privacy Leakage Detection Technology
    Chen, Lu
    Shi, Congcong
    Ma, Yuanyuan
    Shao, Zhipeng
    2018 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2018), 2018, : 172 - 177
  • [32] Research on Teaching Methods and Contents of Public Security Institutions "Network Attack and Defense Technology" Course
    Xu Guo-tian
    NATIONAL TEACHING SEMINAR ON CRYPTOGRAPHY AND INFORMATION SECURITY (2010NTS-CIS), PROCEEDINGS, 2010, : 216 - 219
  • [33] Research on Network Security Defense in Depth Technology in Cross-Regional Power Transmission Grid
    Su, Haohui
    Huang, Yu
    Chen, Yanzhou
    2023 IEEE/IAS INDUSTRIAL AND COMMERCIAL POWER SYSTEM ASIA, I&CPS ASIA, 2023, : 964 - 967
  • [34] Can an Ego Defense Mechanism Model Help Explain Dysfunctional IS Security Behavior? Completed Research
    Chaudhury, Abhijit
    Mallick, Debasish
    AMCIS 2018 PROCEEDINGS, 2018,
  • [35] Security Research of Redundancy in Mimic Defense System
    Ma, Bolin
    Zhang, Zheng
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 2910 - 2914
  • [36] Research on Cloud Security Technology
    Zhao, Liu-tao
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND TECHNOLOGY (ICCST 2015), 2015, : 460 - 463
  • [37] Technology roadmap of security research
    VTT Tied Valt Tek Tutkimuskeskus, 2007, 2368 (3-33):
  • [38] Technology roadmap of security research
    Anon
    VTT Tiedotteita - Valtion Teknillinen Tutkimuskeskus, 2007, (2368): : 1 - 33
  • [39] Research on the Network Technology Security
    Rong, Wang
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 1739 - 1741
  • [40] The Intelligent Offense and Defense Mechanism of Internet of Vehicles Based on the Differential Game-IP Hopping
    He, Yun
    Zhang, Min
    Yang, Xiaolong
    Sun, Qifu Tyler
    Luo, Jingtang
    Yu, Yao
    IEEE ACCESS, 2020, 8 : 115217 - 115227