Difference between revisions of "Technical-reports"
From Security Unileon
SecurityAdm (talk | contribs) |
SecurityAdm (talk | contribs) |
||
(One intermediate revision by the same user not shown) | |||
Line 15: | Line 15: | ||
: Analyzing Mobile Applications A methodology for analyzing iOS apps from privacy and security point of view | : Analyzing Mobile Applications A methodology for analyzing iOS apps from privacy and security point of view | ||
::* TR access: ([https://drive.google.com/file/d/1EUh0XOYd_i1tDBWo5-A9PdXctldKKqey/view?usp=sharing PDF]) | ::* TR access: ([https://drive.google.com/file/d/1EUh0XOYd_i1tDBWo5-A9PdXctldKKqey/view?usp=sharing PDF]) | ||
+ | |||
+ | |||
+ | In 2012 the group already began to investigate aspects of cloud, antimalware and security in mobility environments, the following video is proof of this. ([https://videos.unileon.es/video/5c6014148f4208e9338b45a4 Video]) |
Latest revision as of 21:14, 18 November 2020
During 2013 and 2014, the group carried out work related to the security of the iOS mobile operating system. These works can be seen below:
- PATiA: Privacy Analysis Tool for iOS Applications
- TR access: (PDF)
- iConan Cloud: a service for privacy analyzing on iOS devices
- Francisco J. Rodríguez, Jesús Balsa, Álvaro Botas, Christian García, Vicente Matellán
- Paper access: (PDF)
- Analyzing Mobile Applications A methodology for analyzing iOS apps from privacy and security point of view
- TR access: (PDF)
In 2012 the group already began to investigate aspects of cloud, antimalware and security in mobility environments, the following video is proof of this. (Video)