IOS application-side secure packet decryption of the mobile framework

被引:0
作者
Hou, Shuangshuang [1 ]
Jiang, Jincheng [1 ]
Wang, Xibao [2 ]
Gao, Chengcheng [2 ]
Xu, Jiali [1 ]
机构
[1] Shandong Energy Group CO., LTD., Shandong, Jinan
[2] Yunding Technology Co., Ltd., Shandong, Jinan
关键词
BonreeAgent; Decrypt; Frida; mPaas;
D O I
10.2478/amns-2024-3012
中图分类号
学科分类号
摘要
In transferring the data to the iOS client, the data needs to go through a communication tunnel and be decoded as plaintext information within the client. As a powerful dynamic pile inserter, Frida has played a significant role in decryption and reverse engineering for iOS applications. An attacker can use Frida to decrypt the iOS client for malicious actions like data tampering and destruction. This paper aims to explore client decryption methods for mPaas and BonreeAgent. © 2024 Shuangshuang Hou, Jincheng Jiang, Xibao Wang, Chengcheng Gao and Jiali Xu, published by Sciendo.
引用
收藏
相关论文
共 4 条
  • [1] Lopez J., Uluagac L.B.S., A Survey on Function and System Call Hooking Approaches, Journal of Hardware and Systems Security, (2017)
  • [2] Sabato R., iOS Swift Anti-Jailbreak Bypass with Frida, (2020)
  • [3] Szydlowski M., Manuel Egele, Challenges for Dynamic Analysis of iOS Applications, Open Research Problems in Network, (2011)
  • [4] Soriano-Salvador E., Guardiola-Muzquiz G., Detecting and Bypassing Frida Dynamic Function Call Tracing: Exploitation and Mitigation, Publishedin Journal of Computer Virology and Hacking Techniques, (2022)