<node id="229431">
  <nid>229431</nid>
  <type>external_news</type>
  <uid>
    <user id="27556"><![CDATA[27556]]></user>
  </uid>
  <created>1376907746</created>
  <changed>1475893597</changed>
  <title><![CDATA[Apple iOS Security Defeated by Sneaky App]]></title>
  <body><![CDATA[<p>&nbsp;In "Jekyll on iOS: When Benign Apps Become Evil", a paper presented at the Usenix Security '13 conference, Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee describe how they were able to create apps that can be exploited remotely through program paths that did not exist during the app review process. <em>Source: Information Week</em></p><p>&nbsp;</p>]]></body>
  <field_article_url>
    <item>
      <url><![CDATA[http://www.informationweek.com/tech-center/it-as-a-service/apple-ios-security-defeated-by-sneaky-ap/240160105]]></url>
      <title><![CDATA[]]></title>
    </item>
  </field_article_url>
  <field_publication>
    <item>
      <value><![CDATA[ road closures ]]></value>
    </item>
  </field_publication>
  <field_dateline>
    <item>
      <value>2013-08-18</value>
      <timezone></timezone>
    </item>
  </field_dateline>
  <field_media>
        </field_media>
  <og_groups>
          <item>47223</item>
          <item>50875</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Computer Science]]></item>
      </og_groups_both>
    <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
