Telecommunications Science ›› 2017, Vol. 33 ›› Issue (2): 42-47.doi: 10.11959/j.issn.1000-0801.2017048

• Special topics:intelligent terminals and network security • Previous Articles     Next Articles

Review of iOS malicious application analysis

Yixiang ZHU1,2,Kang ZHANG3,Weiqing WANG4   

  1. 1 National Engineering Laboratory for Mobile Internet System and Application Security,Shanghai 201315,China
    2 Shanghai Research Institute of China Telecom Co.,Ltd.,Shanghai 200122,China
    3 Shanghai Branch of China Telecom Co.,Ltd.,Shanghai 200120,China
    4 China Telecom Corporation,Beijing 100033,China
  • Revised:2017-02-14 Online:2017-02-01 Published:2017-03-07

Abstract:

The security architecture and distribution of iOS were introduced.The threats to user's data security and privacy from iOS malicious applications were analyzed.The reasons that the number of iOS malicious applications is less than Android malicious applications were discussed.The attacking methods of emerging iOS malicious applications were summed up.And prospect for future mitigation and confrontation strategies were given.

Key words: iOS security, malicious code, malicious application

CLC Number: 

No Suggested Reading articles found!