Analyzing iOS Apps - Road from AppStore to Security Analysis Report
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore a comprehensive toolset for detecting vulnerabilities in binary iOS applications in this conference talk from Recon 2017 Brussels. Learn about a four-step analysis workflow that includes downloading and decrypting iOS apps from the App Store, decompiling applications using LLVM as the intermediate representation language, performing static analysis to identify common vulnerabilities, and generating human-readable pseudocode. Discover how the toolset handles Objective-C and Swift applications, reconstructs program semantics, and utilizes runtime type information. See real-world examples of common security flaws and how they can be identified using this advanced analysis engine.
Syllabus
Recon 2017 Brussels - Analyzing iOS apps: road from AppStore to security analysis report
Taught by
Recon Conference
Related Courses
Threat Hunting with YaraPluralsight Reverse Engineering 3201: Symbolic Analysis
OpenSecurityTraining2 via Independent Firing Rounds at the Analysis Shooting Gallery - CSAW'16 Security Workshop
New York University (NYU) via YouTube angr: Binary Analysis Framework - Demonstration and Analysis
New York University (NYU) via YouTube Debin: Predicting Debug Information in Stripped Binaries
Association for Computing Machinery (ACM) via YouTube