Method for obtaining encrypted data on iOS platform

A technology for encrypting data and encryption algorithms, applied in the field of mobile security, can solve the problems of laborious and time-consuming, fuzzy program symbols, insufficient analysis methods, etc., and achieve the effects of technical stability, improved efficiency, and high efficiency

Active Publication Date: 2019-08-06
BEIJING UNIV OF POSTS & TELECOMM
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] Whether it is static analysis or dynamic debugging, it is only based on the internal analysis of the program, and the external function characteristics related to encryption cannot be extracted, and for the data encryption process, the encryption characteristics cannot be unified and fixed, relying on the reverse analysis of the program , cannot be separated from the relevant static and dynamic analysis techniques, and the analysis method itself has shortcomings
[0021] (2) Insufficiency of static analysis
[0024] Static analysis largely relies on reading assembly code, so there are many open source or paid tools that can be used to obfuscate or pack, in order to resist static analysis; such as hardening the program to harden the platform, and LLVM to confuse the control data flow , obfuscating program symbols, original encrypted function names, etc., can make the disassembly code difficult to read
The existence of the above situations has caused great difficulties for static analysis to find encryption functions.
[0025] (3) Insufficiency of dynamic debugging
Moreover, dynamic debugging itself is a very complicated and cumbersome operation. If you encounter anti-debugging, you need to manually analyze it, patch the program, and configure quite cumbersome steps for debugging, which is laborious and time-consuming.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for obtaining encrypted data on iOS platform
  • Method for obtaining encrypted data on iOS platform
  • Method for obtaining encrypted data on iOS platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0061] In order to extract encrypted data of iOS applications on the iOS platform, the present invention provides a method for obtaining encrypted data on the iOS platform, which is specifically described as follows:

[0062] Such as figure 1 Shown, the process step of the method of the present invention is as follows:

[0063] For the encrypted data generated by an iOS application, the Crypto library that comes with iOS is first processed. According to the setting rules of various encryption algorithms in the Crypto library, for the CC_MD5 function, CC_SHA256 function, and CCHmac function in the Hash algorithm, the symmetric encryption algorithm The CCCrypt function, the SecKeyEncrypt function in the asymmetric encryption algorithm RSA, etc. set function hooks.

[0064] Read the rule file, that is, the setting rules of various types of encr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of mobile security in information security, and relates to a method for obtaining the encrypted data on an iOS platform. The method comprises the steps ofconstructing a continuously expanded encryption feature library by adopting a DBI technology according to a Crypto library and a third-party library built in the iOS; and when the iOS runs, extractingthe encrypted data and the key feature vector from the iOS application, and finally obtaining the encrypted data on the iOS platform. According to the method, the technology is more stable, the efficiency is higher, and the method is not influenced by the software reinforcement and the reverse debugging. Compared with reinforcement and confusion appearing in static analysis, a dynamic binary instrumentation tool breaks away from the static behavior characteristics and does not depend on static analysis any more, and has higher universality. Compared with anti-debugging behaviors appearing inconfusion and dynamic debugging, the relevant characteristics of debugging cannot be embodied in the program, and therefore the program cannot be detected more easily.

Description

technical field [0001] The invention belongs to the technical field of mobile security in information security, relates to a technology for obtaining data during dynamic execution of iOS applications, and in particular to a method for obtaining encrypted data on an iOS platform. Background technique [0002] A lot of research has been done in the field of security analysis of software encryption algorithms at home and abroad, and some feasible security analysis methods including static and dynamic are proposed, and corresponding software security analysis tools are constructed. At present, the analysis methods for encrypted data on the iOS platform mainly include: static analysis, dynamic debugging, etc. The following examples are briefly described. [0003] · Static analysis of encrypted features [0004] Static analysis first needs to reversely analyze the function call process, and analyze the corresponding modules and import and export tables for the encryption algorith...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36G06F21/57
CPCG06F11/3644G06F21/577G06F2221/033
Inventor 徐国爱徐国胜李宗顺
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products