A collection of iOS research presentations, videos and interesting papers-
iOS Hacking:
Title | Year | Author | Download link |
Fuzzing the Phone in your Phone | 2009 | Charlie Miller & | Paper |
iPhone security model & vulnerabilities | 2010 | Cedric Halbronn & | |
iPhone 3GS Forensics: Logical analysis using Apple?iTunes Backup Utility | 2010 | Mona Bader & Ibrahim Baggili | Paper |
Evolution of iOS Data Protection and iPhone?Forensics:?from iPhone OS to iOS 5 | 2011 | Andrey Belenko & Dmitry Sklyarov | Slides |
iPhone?Forensics on iOS 5 | 2011 | Satishb3 | Paper,?Video |
Forensic Analysis of iOS Backups | 2011 | Satishb3 | Paper,?Video |
Overcoming iOS data protection to re-enable iPhone?Forensics | 2011 | Andrey Belenko | |
Apple iOS 4 Security Evaluation | 2011 | Dino A. Dai Zovi | |
Practical Consideration of iOS?Device | 2011 | Jens Heider & Matthias Boll | |
iPhone data protection in depth | 2011 | Jean-Baptiste Bedrune & Jean Sigwald | |
Exploiting The iOS Kernel | 2011 | Stefan Esser | |
iOS Kernel Exploitation? –? IOKIT Edition | 2011 | Stefan Esser | |
Targeting the iOS kernel | 2011 | Stefan Esser | |
The Apple Sandbox | 2011 | Dionysus Blazakis | |
The iOS MDM Protocol | 2011 | David Schuetz | |
iPhone Exploitation One ROPe to bind them all? | 2011 | Stefan Esser | |
iOS Forensics: Overcoming iPhone Data Protection | 2011 | Andrey Belenko | |
Handling iOS encryption in?a forensic investigation | 2011 | Jochem van Kerkwijk | |
IPhone backup files. A penetration tester’s?treasure | 2011 | SANS | |
iPhone Forensics with F/OSS | 2011 | ViaForensics | |
Evolution of iPhone Baseband and unlocks | 2012 | MuscleNerd | |
iPhone data protection in depth | 2012 | Jean-baptiste.bedrune & Jean.sigwald | |
Corona Jailbreak for iOS 5.0.1 | 2012 | Jailbreak Dream team | |
iOS Security | 2012 | Apple | |
Absinthe Jailbreak for iOS 5.0.1 | 2012 | Jailbreak Dream team | |
Breaking iOS code signing | 2012 | Charlie Miller | |
Overview on Apple iOS Security | 2012 | Ahmad Reza Sadeghi | |
iOS 5 – an exploitation night mare | 2012 | Stefan Esser | |
Jailbreaking Techniques | 2012 | Pod2g | |
iOS 6 kernel security: A Hacker’s guide | 2012 | Mark Dowd & | |
Swiping Through Modern Security Features | 2013 | evad3rs | |
iOS 6 Exploitation 280 days later | 2013 | stefan esser | |
iOS Vulnerabilities Garage Sale | 2013 | stefan esser | |
Hacking Apple Accessories to pown iDevices | 2013 | Mathieu Renard | |
Injecting Malware into iOS Devices via Malicious Chargers | 2013 | Billy Lau & Yeongjin Jang & Chengyu Song |
?
iOS Hardening
Title | Year | Author | Download link |
iOS Hardening Configuration Guide | 2012 | Australian Government | |
Apple iOS Security in the Enterprise | 2012 | Oliver Karow |
?
iOS Application Hacking
Title | Year | Author | Download link |
Penetration testing of iPhone/iPad applications | 2010 | Kunjan Shah | |
New age application attacks against Apple iOS and?countermeasures | 2011 | Nitesh Dhanjani | |
Hacking and Securing Next Generation iPhone and iPad?Apps | 2011 | Nitesh Dhanjani ?& Sean Pennline | |
Secure Development on iOS – Advice for developers?and penetration testers | 2011 | David Thiel | |
Pentesting iPhone & iPad Apps | 2011 | Flora Bottaccio & | |
Detecting Privacy Leaks in iOS Applications | 2011 | Manuel Egeley, Christopher Kruegel, Engin Kirdaz ?& | |
Evaluating iOS Applications | 2011 | Dominic Chell | |
iOS applications reverse engineering | 2011 | Julien Bachmann | |
Attacking iPhone & iPad Applications | 2011 | Sebastien Andrivet | |
Pentesting iPhone applications | 2011 | Satishb3 | |
iOS Application (In)Security | 2012 | Dominic Chell | |
Auditing iPhone and iPad applications | 2012 | Ilja van Sprundel | |
iOS SSL kill switch | 2012 | Justine Osborne & | |
Smart Phones Security | 2012 | Tomá? Rosa | |
Hacking and securing iOS applications | 2012 | Satishb3 | |
Attacking iPhone Applications | 2012 | Chilik Tamir | |
Practical iOS Applications Hacking | 2012 | Mathieu RENARD | |
Pentesting iOS Apps Runtime Analysis and | 2012 | Andreas Kurtz | |
Pentesting iOS Applications | 2013 | Jason Haddix | |
iAnalyzer-No More Blackbox iOS Analysis | 2013 | Chilik Tamir | |
Protecting Sensitive information on iOS devices | 2013 | Darth Null | |
How to assess and secure iOS apps | 2013 | NccGroup |
?
Best Sites:
1.?www.theiphonewiki.com
2.?https://code.google.com/p/iphone-dataprotection/