iOS App Integrity: Enhancing Security with Encrypted Code Modules
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Syllabus
Introduction
iOS Mobile App Security (MAS) Elevator Pitch
Hacking and Jailbreaking ios Attacks and weaknesses are well documented
Recent iOS App Coding and OS Reported Vulnerabilities
Standard iOS Application Today
Research Idea: IMAS Secure Application Framework
iOS Security Architecture
IMAS App Security "trade-space" Comparison Mar 2014
IMAS - Security Controls Device Access
Github: project-imas.github.io 13 Controls
IMAS - Encrypted Core Data (ECD) em
Encrypted Core Data Additional iMAS Support
Multi-compiler Based on work out of UC Irvine by Michael Franz and Per Larsen . Produces different binaries each compile • Static analysis and ROP exploits must account for variations
System Monitor - Monitor all device processes and network calls at the kernel level - Filtering tools to find and react to developer defined system events -IMAS provides direct programmatic app integration
Memory Security Allows encryption, wiping, and checksums of objects in memory - Provides function address space validation Application Start
File Shredding
IMAS Sentry Application Add to existing Apple deployed devices • Jailbreak and Debugger Detection
Prior Research Focus - modifying ELF structures
iOS Static App Attacks
Static App Attacks Process
Code Injection and Binary Patching
Consequences of Static Attacks
Encrypted Code Modules (ECM) WHAT?
IMAS Encrypted Code Modules (ECM) Summary
ECM - Encrypted Code Modules Concept 2/3
Build Summary
App Startup
Validating Integrity
ECM Advantages
Taught by
OWASP Foundation
Related Courses
Ethical Hacking: Mobile Devices and PlatformsLinkedIn Learning Learning Mobile Device Security
LinkedIn Learning Supporting Face ID and Touch ID Authentication in iOS Using Swift 5
Pluralsight CNIT 128: Hacking Mobile Devices
CNIT - City College of San Francisco via Independent Ethical Hacking: Hacking Mobile Platforms
Pluralsight