JIS  Vol.1 No.2 , October 2010
iPhone Security Analysis
Abstract: The release of Apple’s iPhone was one of the most intensively publicized product releases in the history of mobile devices. While the iPhone wowed users with its exciting design and features, it also angered many for not allowing installation of third party applications and for working exclusively with AT & T wireless services (in the US). Besides the US, iPhone was only sold only in a few other selected countries. Software attacks were developed to overcome both limitations. The development of those attacks and further evaluation revealed several vulnerabilities in iPhone security. In this paper, we examine some of the attacks developed for the iPhone as a way of investigating the iPhone’s security structure. We also analyze the security holes that have been discovered and make suggestions for improving iPhone security.
Cite this paper: nullV. Pandya and M. Stamp, "iPhone Security Analysis," Journal of Information Security, Vol. 1 No. 2, 2010, pp. 74-87. doi: 10.4236/jis.2010.12009.

[1]   C. Maxcer, “Apple Minus AT&T Equals Lots of iPhones Somewhere Else,” Mac News World. http://www.mac-

[2]   iPhone, Apple–iPhone.

[3]   ARM, ARM1176 Processor.

[4]   A. L. Shimpi, “Apple’s iPhone Dissected: We did it, so you don’t have to,” Anandtech, 29 June 2007. http://www.

[5]   In brief, Network Security, Vol. 2009, No. 7, July 2009, pp. 3.

[6]   Best iPhone Apps.

[7]   K Dunham, “Mobile Malware Attacks and Defense,” Elsevier 2009, pp. 197-265.

[8]   B. Haines, “Seven Deadliest Wireless Technologies Attacks,” Syngress, 2010.

[9]   Max Console. newsid= 9516

[10]   Common Vulnerabilities and Exposures, 2006. http://cve.

[11]   TIFF Library and Utilities, 15 January 2008. http://www.

[12]   National Vulnerability Database, 2006. http://nvd.nist. gov/nvd.cfm?cvename=CVE-2006-3459

[13]   “Stack buffer overflow,” Wikipedia. http://en.wikipedia. org/wiki/Stack_buffer_overflow

[14]   M. Stamp, “Information Security: Principles and Practice,” Wiley 2005.

[15]   C. Cowan, et al., “StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks,” Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, January 26-29, 1998.

[16]   “Return-to-libc,” Wikipedia. Return-to-libc

[17]   Maptools, 15 January 2008. tiff/

[18]   Adobe Developers Association, TIFF Revision 6.0 Final, 3 June 1992. en/tiff/TIFF6.pdf

[19]   “Tagged Image File Format,” Wikipedia.

[20]   Simple Machines, The ARM instruction set. http://www.

[21]   “1176JZF-S Technical Reference Manual Revision r0p7,” ARM. arm.doc.ddi0301g/DDI0301G_arm1176jzfs_r0p7_trm.pdf

[22]   “Little-endian,” Wikipedia. Little_endian

[23]   Toc2rta, TIFF exploit. exploit.cpp

[24]   “Bloodhound.Exploit.166 Technical Details,” Symantec, 9 November 2007.

[25]   V. Pandya., IPhone security analysis, Masters Thesis, Department of Computer Science, San Jose State University, 2008. pandya_vaibhav.pdf

[26]   Metasploit.

[27]   iPhone

[28]   iPhone Sim Free.

[29]   Hackintosh, Turbosim Technical Background. http://

[30]   Hackintosh, iPhone.

[31]   G. Hotz, “On the iPhone,” 15 February 2008. http://

[32]   C. Miller, J. Honoroff and J. Mason, “Security Evaluation of Apple’s iPhone,” Independent Security Evaluators, 19 July 2007.

[33]   The Webkit Open Source Project.

[34]   Perl Compatible Regular Expressions, Change log. http://

[35]   C. Miller, “Hacking Leopard: Tools and Techniques for Attacking the Newest Mac OS X,” Black Hat Media Archives, 2 August 2007. entations/bh-usa-07/Miller/Presentation/bh-usa-07-miller. pdf