Research Area:  Digital Forensics
It is without a doubt that malware especially designed for modern mobile platforms is rapidly becoming a serious threat. The problem is further multiplexed by the growing convergence of wired, wireless and cellular networks, since virus writers can now develop sophisticated malicious software that is able to migrate across network domains. This is done in an effort to exploit vulnerabilities and services specific to each network. So far, research in dealing with this risk has concentrated on the Android platform and mainly considered static solutions rather than dynamic ones. Compelled by this fact, in this paper, we contribute a fully-fledged tool able to dynamically analyze any iOS software in terms of method invocation (i.e., which API methods the application invokes and under what order), and produce exploitable results that can be used to manually or automatically trace software’s behavior to decide if it contains malicious code or not. By employing real life malware we assessed our tool both manually, as well as, via heuristic techniques and the results we obtained seem highly accurate in detecting malicious code.
Keywords:  
Author(s) Name:  Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis & Sang Oh Park
Journal name:  Peer-to-Peer Networking and Applications
Conferrence name:  
Publisher name:  Springer
DOI:  10.1007/s12083-012-0179-x
Volume Information:  volume 7, pages687–697 (2014)
Paper Link:   https://link.springer.com/article/10.1007/s12083-012-0179-x