{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:44Z","timestamp":1750306604670,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,14]],"date-time":"2015-04-14T00:00:00Z","timestamp":1428969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,14]]},"DOI":"10.1145\/2714576.2714593","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T16:27:14Z","timestamp":1428078434000},"page":"463-474","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Enpublic Apps"],"prefix":"10.1145","author":[{"given":"Min","family":"Zheng","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Hui","family":"Xue","sequence":"additional","affiliation":[{"name":"FireEye Inc., San Francisco, CA, USA"}]},{"given":"Yulong","family":"Zhang","sequence":"additional","affiliation":[{"name":"FireEye Inc., San Francisco, CA, USA"}]},{"given":"Tao","family":"Wei","sequence":"additional","affiliation":[{"name":"FireEye Inc., San Francisco, CA, USA"}]},{"given":"John C.S.","family":"Lui","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2015,4,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"API Reference of iOS Frameworks 2014. https:\/\/developer.apple.com\/library\/ios\/navigation\/#section=Resource%20Types&topic=Reference.  API Reference of iOS Frameworks 2014. https:\/\/developer.apple.com\/library\/ios\/navigation\/#section=Resource%20Types&topic=Reference."},{"key":"e_1_3_2_1_2_1","unstructured":"App store review guidelines. https:\/\/developer.apple.com\/appstore\/resources\/approval\/guidelines.html.  App store review guidelines. https:\/\/developer.apple.com\/appstore\/resources\/approval\/guidelines.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Apple Bans Qihoo Apps From iTunes App Store February 2012. http:\/\/www.techinasia.com\/apple-bans-qihoo-apps\/.  Apple Bans Qihoo Apps From iTunes App Store February 2012. http:\/\/www.techinasia.com\/apple-bans-qihoo-apps\/."},{"volume-title":"Creating Jobs Through Innovation","year":"2012","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"CCTool. http:\/\/www.opensource.apple.com\/source\/cctools.  CCTool. http:\/\/www.opensource.apple.com\/source\/cctools."},{"key":"e_1_3_2_1_6_1","unstructured":"Choosing an iOS Developer Program 2014. https:\/\/developer.apple.com\/programs\/start\/ios\/.  Choosing an iOS Developer Program 2014. https:\/\/developer.apple.com\/programs\/start\/ios\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Class-dump. http:\/\/stevenygard.com\/projects\/class-dump.  Class-dump. http:\/\/stevenygard.com\/projects\/class-dump."},{"key":"e_1_3_2_1_8_1","unstructured":"CVE-2014-1276 IOKit HID Event 2014. http:\/\/support.apple.com\/en-us\/HT202935.  CVE-2014-1276 IOKit HID Event 2014. http:\/\/support.apple.com\/en-us\/HT202935."},{"key":"e_1_3_2_1_9_1","unstructured":"Cydia Substrate. http:\/\/www.cydiasubstrate.com.  Cydia Substrate. http:\/\/www.cydiasubstrate.com."},{"volume-title":"evasi0n jailbreaking tool","year":"2013","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"How Apple's Enterprise Distribution Program was abused to enable the installation of a GameBoy emulator 2014. http:\/\/www.imore.com\/how-gameboy-emulator-finding-its-way-non-jailbroken-devices.  How Apple's Enterprise Distribution Program was abused to enable the installation of a GameBoy emulator 2014. http:\/\/www.imore.com\/how-gameboy-emulator-finding-its-way-non-jailbroken-devices."},{"key":"e_1_3_2_1_12_1","unstructured":"How Many Apps Are in the iPhone App Store. http:\/\/ipod.about.com\/od\/iphonesoftwareterms\/qt\/apps-in-app-store.htm.  How Many Apps Are in the iPhone App Store. http:\/\/ipod.about.com\/od\/iphonesoftwareterms\/qt\/apps-in-app-store.htm."},{"key":"e_1_3_2_1_13_1","unstructured":"iOS Dev Center. https:\/\/developer.apple.com\/devcenter\/ios\/index.action.  iOS Dev Center. https:\/\/developer.apple.com\/devcenter\/ios\/index.action."},{"key":"e_1_3_2_1_14_1","unstructured":"iOS Dev Center 2014. https:\/\/developer.apple.com\/devcenter\/ios\/index.action.  iOS Dev Center 2014. https:\/\/developer.apple.com\/devcenter\/ios\/index.action."},{"key":"e_1_3_2_1_15_1","unstructured":"Java Reflection. http:\/\/docs.oracle.com\/javase\/tutorial\/reflect\/.  Java Reflection. http:\/\/docs.oracle.com\/javase\/tutorial\/reflect\/."},{"key":"e_1_3_2_1_16_1","unstructured":"Kuai Yong iOS device management 2014. http:\/\/www.kuaiyong.com\/eg_web\/index.html.  Kuai Yong iOS device management 2014. http:\/\/www.kuaiyong.com\/eg_web\/index.html."},{"volume-title":"A cross-platform software protocol library and tools to communicate with iOS devices natively","year":"2014","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","unstructured":"OS X ABI Mach-O File Format Reference. https:\/\/developer.apple.com\/library\/mac\/documentation\/DeveloperTools\/Conceptual\/MachORuntime\/Reference\/reference.html.  OS X ABI Mach-O File Format Reference. https:\/\/developer.apple.com\/library\/mac\/documentation\/DeveloperTools\/Conceptual\/MachORuntime\/Reference\/reference.html."},{"key":"e_1_3_2_1_19_1","unstructured":"Pangu Jailbreak 2014. http:\/\/pangu.io\/.  Pangu Jailbreak 2014. http:\/\/pangu.io\/."},{"volume-title":"January","year":"2013","author":"Apps OS","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","unstructured":"Tim Cook to shareholders: iPhone 5s\/c outpace predecessors Apple bought 23 companies in 16 months. http:\/\/appleinsider.com\/articles\/14\/02\/28\/tim-cook-at-shareholder-meeting-iphone-5s-5c-outpace-predecessors-apple-bought-23-companies-in-16-months.  Tim Cook to shareholders: iPhone 5s\/c outpace predecessors Apple bought 23 companies in 16 months. http:\/\/appleinsider.com\/articles\/14\/02\/28\/tim-cook-at-shareholder-meeting-iphone-5s-5c-outpace-predecessors-apple-bought-23-companies-in-16-months."},{"key":"e_1_3_2_1_22_1","unstructured":"Using Identifiers in Your Apps 2013. https:\/\/developer.apple.com\/news\/index.php?id=3212013a.  Using Identifiers in Your Apps 2013. https:\/\/developer.apple.com\/news\/index.php?id=3212013a."},{"key":"e_1_3_2_1_23_1","unstructured":"Vulnerability Summary for CVE-2014-4423 2014. http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-4423.  Vulnerability Summary for CVE-2014-4423 2014. http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-4423."},{"key":"e_1_3_2_1_24_1","unstructured":"When Malware Goes Mobile. http:\/\/www.sophos.com\/en-us\/security-news-trends\/security-trends\/malware-goes-mobile\/why-ios-is-safer-than-android.aspx.  When Malware Goes Mobile. http:\/\/www.sophos.com\/en-us\/security-news-trends\/security-trends\/malware-goes-mobile\/why-ios-is-safer-than-android.aspx."},{"volume-title":"iOS Application (In)Security","year":"2012","author":"Chell D.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","first-page":"09","volume-title":"CNN Money. Retrieved","author":"Goldman D.","year":"2010"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_17"},{"volume-title":"Proceedings of the Black Hat USA Briefings","year":"2014","author":"Jang Y.","key":"e_1_3_2_1_28_1"},{"volume-title":"Proceedings of the Black Hat USA Briefings","year":"2013","author":"Lau B.","key":"e_1_3_2_1_29_1"},{"volume-title":"Proceedings of Symposium on SyScan","year":"2011","author":"Miller C.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/2378748"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"volume-title":"iphone applications & privacy issues: An analysis of application transmission of iphone unique device identifiers (udids)","year":"2010","author":"Smith E.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","first-page":"79","volume-title":"Proceedings of the 23rd USENIX conference on Security Symposium","author":"Tielei W.","year":"2014"},{"key":"e_1_3_2_1_35_1","first-page":"559","volume-title":"Presented as part of the 22nd USENIX Security Symposium","author":"Wang T.","year":"2013"},{"volume-title":"Wirelurker: A new era in ios and os x malware","year":"2014","author":"Xiao C.","key":"e_1_3_2_1_36_1"}],"event":{"name":"ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Republic of Singapore","acronym":"ASIA CCS '15"},"container-title":["Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2714576.2714593","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2714576.2714593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:54Z","timestamp":1750227414000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2714576.2714593"}},"subtitle":["Security Threats Using iOS Enterprise and Developer Certificates"],"short-title":[],"issued":{"date-parts":[[2015,4,14]]},"references-count":36,"alternative-id":["10.1145\/2714576.2714593","10.1145\/2714576"],"URL":"https:\/\/doi.org\/10.1145\/2714576.2714593","relation":{},"subject":[],"published":{"date-parts":[[2015,4,14]]},"assertion":[{"value":"2015-04-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}