Review of iOS malicious application analysis
The security architecture and distribution of iOS were introduced.The threats to user's data security and privacy from iOS malicious applications were analyzed.The reasons that the number of iOS malicious applications is less than Android malicious applications were discussed.The attacking meth...
Saved in:
Main Authors: | Yixiang ZHU, Kang ZHANG, Weiqing WANG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2017-02-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017048/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research on malicious behavior detection based on iOS system
by: Yuliang WANG, et al.
Published: (2017-02-01) -
Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network
by: Haojie HUANG, et al.
Published: (2020-06-01) -
Malicious code within model detection method based on model similarity
by: Degang WANG, et al.
Published: (2023-08-01) -
Deep visualization classification method for malicious code based on Ngram-TFIDF
by: WANG Jinwei, et al.
Published: (2024-06-01) -
Endogenous detection framework of malicious behavior in information network
by: Zhe TU, et al.
Published: (2020-10-01)