Some researchers of Georgia Institute of Technology who are doing research on computer security have proved that they can destroy Apple’s iOS by creating some malicious apps. They named these malicious apps as Jekyll apps. They presented a paper “Jekyll on iOS: When Benign Apps Become Evil” in the 13th Conference of Usenix Security and demonstrated how they could create malicious apps that could be controlled remotely by using software paths.
Basically every system has flaws. IOS also has some flaws like other operating systems and these researchers have caught these flaws. They can exploit iOS on the basis of these flaws they caught in it. On the other hand, Apple can overcome these flaws once it comes to know about them and if it does not come to know, it cannot identify.
The creators of Jekyll apps do not concentrate on the implementation flaws in Apple’s operating system. They demonstrate their logic regarding the control flaws in iOS and got the remote control over the iOS.
Adding malicious logic system while it is starting, does not detect the errors by the static analysis’ automated methods and reviewers. Through automated methods for static analysis can be considered a way for the code analysis of the program without following the instructions. These four researchers proved their logic by submitting a Jekyll app to iOS to get it sanctioned by Apple for downloading it.
When it was asked whether it is an easy task to create and use such a malicious app, one of the researchers elaborated in an email that they assume that Apple has a deep perception regarding unexecuted offshoots of codes that may invite malicious behavior when some specific conditions occur.