Anonymous
2013-09-04 18:47:51 UTC
Four computer security researchers from the Georgia Institute of
Technology have demonstrated that they can create malicious apps
that can avoid detection by Apple's app review process.
In "Jekyll on iOS: When Benign Apps Become Evil", a paper
presented at the Usenix Security '13 conference, Tielei Wang,
Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee describe how
they were able to create apps that can be exploited remotely
through program paths that did not exist during the app review
process. The researchers call these "Jekyll apps," because they
conceal their malicious side.
http://www.informationweek.com/mobility/smart-phones/apple-ios-
security-defeated-by-sneaky-ap/240160105
Technology have demonstrated that they can create malicious apps
that can avoid detection by Apple's app review process.
In "Jekyll on iOS: When Benign Apps Become Evil", a paper
presented at the Usenix Security '13 conference, Tielei Wang,
Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee describe how
they were able to create apps that can be exploited remotely
through program paths that did not exist during the app review
process. The researchers call these "Jekyll apps," because they
conceal their malicious side.
http://www.informationweek.com/mobility/smart-phones/apple-ios-
security-defeated-by-sneaky-ap/240160105