Research on Offense and Defense Technology for iOS Kernel Security Mechanism

被引:1
|
作者
Chu, Sijun [1 ]
Wu, Hao [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450000, Peoples R China
关键词
iOS kernel security mechanism; kernel integrity protection mechanism; ROP &shellcode; iOS security testing;
D O I
10.1063/1.5033796
中图分类号
O59 [应用物理学];
学科分类号
摘要
iOS is a strong and widely used mobile device system. Its annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Research of a security mechanism in softswitch
    Lin, N
    Wang, Z
    Wang, GX
    ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 504 - 508
  • [42] The Security Mechanism Research of PACS
    Zeng Xu
    MATERIALS, TRANSPORTATION AND ENVIRONMENTAL ENGINEERING, PTS 1 AND 2, 2013, 779-780 : 1809 - 1812
  • [43] An Intelligent Defense Mechanism for Security in Wireless Sensor Networks
    Kumar, E. Sandeep
    Kusuma, S. M.
    Kumar, B. P. Vijaya
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [44] Microservice Security Framework for IoT by Mimic Defense Mechanism
    Ying, Fei
    Zhao, Shengjie
    Deng, Hao
    SENSORS, 2022, 22 (06)
  • [45] The Offense-Defense Balance of Scientific Knowledge: Does Publishing AI Research Reduce Misuse?
    Shevlane, Toby
    Dafoe, Allan
    PROCEEDINGS OF THE 3RD AAAI/ACM CONFERENCE ON AI, ETHICS, AND SOCIETY AIES 2020, 2020, : 173 - 179
  • [46] Deepening of Japan-Europe Security and Defense Cooperation through Defense Technology Partnerships
    Baldauff, Nanae
    ASIA-PACIFIC REVIEW, 2024, 31 (03) : 18 - 25
  • [47] Research on Collaborative Defense Model of Power Grid Security
    Guan, Xiaojuan
    Ma, Yuanyuan
    Shao, Zhipeng
    Zhang, Bo
    2018 8TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2018, : 270 - 273
  • [48] The Research of Security Threat and Corresponding Defense Strategy for WSN
    Li Yi
    Fu Zhongyong
    2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 1274 - 1277
  • [49] Research on Security Defense System of New Power System
    Xin B.
    Li M.
    He J.
    He J.
    Sun W.
    Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 2023, 43 (15): : 5723 - 5731
  • [50] Research and implementation of network security cooperative defense system
    An, Xifeng
    Li, Weihua
    Liu, Zun
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2008, 42 (12): : 1495 - 1499