Researchers bypass Apple security gauntlet

Dec 05, 2013

Hacking programs disguised as games are helping Apple to improve the security of devices operating on its iOS platform.

Software companies work hard to protect their customers' personal data from malicious applications, or 'apps', but even the most secure devices can be vulnerable. Skilled and independent computer scientists, such as Jin Han and co-workers at the A*STAR Institute for Infocomm Research and the Singapore Management University, can greatly assist companies by spotting security weaknesses before they are exploited.

Han and co-workers recently published a detailed comparison of the two very different security models used by the big players in mobile software, Apple's iOS platform and Google's Android. Now, the researchers have developed subtle attack apps that test the secretive model of mobile security used in iOS.

Apple's preferred security model is 'closed source'. This means that the company does not publish details of how apps are vetted before becoming available in their iTunes Store. Apple also refrains from publishing the internal code that decides whether apps can control phone functions such as contacts, calendars or cameras.

Despite this secrecy, the researchers were able to develop generic attack codes that enabled third-party control of iOS devices. They demonstrated seven different attack apps, disguised as games, that performed malicious actions including cracking the device's PIN, taking photographs and sending text messages without the user's awareness.

"We utilized private function calls to gain privileges that are not intended for third-party developers," explains Han. "Furthermore, we found a way to bypass Apple's vetting process so that our apps, embedded with proof-of-concept attacks, could be published on iTunes."

The attack apps worked on both iOS 5 and 6, although the team was careful to include secret triggers to protect any public users. The researchers have shared all of their findings with Apple and published recommendations on how the company should fix these vulnerabilities.

"Apple responded very quickly after we informed them about our findings, and before the release of the new iOS 7 platform," says Han. He expects that the company adopted countermeasures similar to those described in his team's paper, but cannot confirm this since iOS is closed source.

The ongoing debate over open- versus closed-source development will continue to rage among information technology specialists. Nevertheless, Han notes that their attack-app codes could, with some modifications, probably also bypass the permissions-based security model used in Android. "My personal opinion is that closed-source development is not good for . A cryptosystem should be secure even if everything about the system, except the key, is public knowledge. I think the same principle applies to operating systems."

Explore further: How we can each fight cybercrime with smarter habits

More information: Han, J., Yan, Q., Gao, D., Zhou, J. & Deng, R. "Comparing mobile privacy protection through cross-platform applications." 20th Annual Network & Distributed System Security Symposium, 26 February 2013.

Han, J., Kywe, S. M., Yan, Q., Bao, F. & Deng, R. et al. "Launching generic attacks on iOS with approved third-party applications." Applied Cryptography and Network Security, Lecture Notes in Computer Science 7954, 272–289 (2013).

add to favorites email to friend print save as pdf

Related Stories

Mobile security: Android versus Apple

Oct 09, 2013

Smartphones are big business, prompting fierce competition between providers. One major concern for consumers is whether a smartphone will keep their private data safe from malicious programs. To date, however, ...

Enhancing security in Apple devices

Nov 06, 2013

A*STAR's Institute for Infocomm Research has helped to fix three security weaknesses in Apple's iOS mobile operating system.

Georgia Tech uncovers iOS security weaknesses

Jul 31, 2013

Researchers from the Georgia Tech Information Security Center (GTISC) have discovered two security weaknesses that permit installation of malware onto Apple mobile devices using seemingly innocuous applications ...

Stanford launches new free course on iPhone/iPad apps

Nov 05, 2013

( —Stanford's incredibly popular online course, Developing Apps for iPhone and iPad, is now available for iOS 7 on iTunes U. As always, this free course is available to anyone, anywhere.

Recommended for you

Computerised vehicles are vulnerable to hacking and theft

6 hours ago

Theft of vehicles is about as old as the notion of transport – from horse thieves to carjackers. No longer merely putting a brick through a window, vehicle thieves have continually adapted to new technology, ...

How we can each fight cybercrime with smarter habits

Jan 26, 2015

Hackers gain access to computers and networks by exploiting the weaknesses in our cyber behaviors. Many attacks use simple phishing schemes – the hacker sends an email that appears to come from a trusted ...

Davos elites warned about catastrophic cyberattacks

Jan 24, 2015

Attacks on power plants, telecommunications and financial systems, even turning all of Los Angeles' traffic lights green: Davos elites were warned Saturday of the terrifying possibilities of modern cyber ...

Email scam nets $214 mn in 14 months: FBI

Jan 22, 2015

An email scam which targets businesses with bogus invoices has netted more than $214 million from victims in 45 countries in just over one year, an FBI task force said Thursday.

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.