Cite this paper
nullV. Pandya and M. Stamp, "iPhone Security Analysis,"
Journal of Information Security, Vol. 1 No. 2, 2010, pp. 74-87. doi:
10.4236/jis.2010.12009.
References
[1] C. Maxcer, “Apple Minus AT&T Equals Lots of iPhones Somewhere Else,” Mac News World.
http://www.mac- newsworld.com/story/61389.html?welcome=1209968031
[2] iPhone, Apple–iPhone.
http://www.apple.com/iphone/
[3] ARM, ARM1176 Processor.
http://www.arm.com/products/CPUs/ARM1176.html
[4] A. L. Shimpi, “Apple’s iPhone Dissected: We did it, so you don’t have to,” Anandtech, 29 June 2007.
http://www. anandtech.com/mac/showdoc.aspx?i=3026&p=3
[5] In brief, Network Security, Vol. 2009, No. 7, July 2009, pp. 3.
[6] Best iPhone Apps.
http://www.Installerapps.com
[7] K Dunham, “Mobile Malware Attacks and Defense,” Elsevier 2009, pp. 197-265.
[8] B. Haines, “Seven Deadliest Wireless Technologies Attacks,” Syngress, 2010.
[9] Max Console.
http://www.maxconsole.net/?mode=news& newsid= 9516
[10] Common Vulnerabilities and Exposures, 2006.
http://cve. mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3459
[11] TIFF Library and Utilities, 15 January 2008.
http://www. libtiff.org/
[12] National Vulnerability Database, 2006.
http://nvd.nist. gov/nvd.cfm?cvename=CVE-2006-3459
[13] “Stack buffer overflow,” Wikipedia.
http://en.wikipedia. org/wiki/Stack_buffer_overflow
[14] M. Stamp, “Information Security: Principles and Practice,” Wiley 2005.
[15] C. Cowan, et al., “StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks,” Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, January 26-29, 1998.
[16] “Return-to-libc,” Wikipedia.
http://en.wikipedia.org/wiki/ Return-to-libc
[17] Maptools, 15 January 2008.
http://dl.maptools.org/dl/lib- tiff/
[18] Adobe Developers Association, TIFF Revision 6.0 Final, 3 June 1992.
http://partners.adobe.com/public/developer/ en/tiff/TIFF6.pdf
[19] “Tagged Image File Format,” Wikipedia.
http://en.wiki- pedia.org/wiki/TIFF
[20] Simple Machines, The ARM instruction set.
http://www. simplemachines.it/doc/arm_inst.pdf
[21] “1176JZF-S Technical Reference Manual Revision r0p7,” ARM.
http://infocenter.arm.com/help/topic/com. arm.doc.ddi0301g/DDI0301G_arm1176jzfs_r0p7_trm.pdf
[22] “Little-endian,” Wikipedia.
http://en.wikipedia.org/wiki/ Little_endian
[23] Toc2rta, TIFF exploit.
http://www.toc2rta.com/files/itiff_ exploit.cpp
[24] “Bloodhound.Exploit.166 Technical Details,” Symantec, 9 November 2007.
[25] V. Pandya., IPhone security analysis, Masters Thesis, Department of Computer Science, San Jose State University, 2008.
http://www.cs.sjsu.edu/faculty/stamp/students/ pandya_vaibhav.pdf
[26] Metasploit.
http://www.metasploit.com
[27] iPhone UnlockUSA.com.
http://iphone.unlock.no
[28] iPhone Sim Free.
http://www.iphonesimfree.com
[29] Hackintosh, Turbosim Technical Background.
http:// hackint0sh.org/forum/showthread.php?t=18048
[30] Hackintosh, iPhone.
http://www.hackint0sh.org
[31] G. Hotz, “On the iPhone,” 15 February 2008.
http:// iphonejtag.blogspot.com/
[32] C. Miller, J. Honoroff and J. Mason, “Security Evaluation of Apple’s iPhone,” Independent Security Evaluators, 19 July 2007.
http://securityevaluators.com/files/papers/exploitingiphone.pdf
[33] The Webkit Open Source Project.
http://webkit.org/
[34] Perl Compatible Regular Expressions, Change log. http://
www.pcre.org/changelog.txt
[35] C. Miller, “Hacking Leopard: Tools and Techniques for Attacking the Newest Mac OS X,” Black Hat Media Archives, 2 August 2007. https://
www.blackhat.com/pres- entations/bh-usa-07/Miller/Presentation/bh-usa-07-miller. pdf