{"229431":{"#nid":"229431","#data":{"type":"external_news","title":"Apple iOS Security Defeated by Sneaky App","body":[{"value":"\u003Cp\u003E\u0026nbsp;In \u0022Jekyll on iOS: When Benign Apps Become Evil\u0022, a paper presented at the Usenix Security \u002713 conference, Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee describe how they were able to create apps that can be exploited remotely through program paths that did not exist during the app review process. \u003Cem\u003ESource: Information Week\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27556","created_gmt":"2013-08-19 10:22:26","changed_gmt":"2016-10-08 02:26:37","author":"Michaelanne Dye","boilerplate_text":"","field_publication":"","publication":"road closures","field_article_url":"","publication_url":"http:\/\/www.informationweek.com\/tech-center\/it-as-a-service\/apple-ios-security-defeated-by-sneaky-ap\/240160105","dateline":{"date":"2013-08-18T00:00:00-04:00","iso_date":"2013-08-18T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"143","name":"Digital Media and Entertainment"}],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}