Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
iOS hacker’s handbook
Miller C., Blazakis D., Dai Zovi D., Esser S., Iozzo V., Weinmann R., Wiley Publishing, Indianapolis, IN, 2012. 408 pp. Type: Book (978-1-118204-12-2)
Date Reviewed: Feb 5 2013

With the extensive use of iOS devices all over the world, threats become more harmful. Think of a monoculture in food production: natural plagues become real menaces to subsistence when larger and larger tracts of land are dedicated to one single crop.

In the past, OS X has been shown to have serious security gaps. As time has passed and Apple has gained more experience and further developed its iOS mobile platform, many of these gaps have been closed, although new ones have been created. This book shows how iOS devices have acquired more effective mechanisms to avoid security attacks. In each chapter, the authors first describe a security building block in detail, and then detail the flaws found and ways a hacker could use each one to cause the most damage.

The book starts with a quick overview of the approaches Apple has taken to counteract the most important weaknesses of its security architecture. The authors go on to describe how iOS is deployed to access sensitive enterprise data, and make some specific recommendations to information technology (IT) administrators on how to manage remote access from personally owned devices and from company-provided devices.

The next chapter shows how the encryption application programming interface (API) works and how developers can make the most out of this interface to provide secure apps. It also gives some tips on how to mess up with four-digit codes. Code signing is the topic of the next chapter. Chapter 5 explains how sandboxing works and discusses alternatives to extract profiles to examine their permissions.

In chapter 6, the authors describe how to “fuzz” with default iOS applications to find vulnerabilities, which involves sending slightly erroneous data to an app to test its reactions. The next four chapters build on the subject, showing how to take advantage of the vulnerabilities discovered to build successful exploits while bypassing security mechanisms such as address space layout randomization, for example.

The book is based on iOS 5 and one can only assume and hope that the strategies, vulnerabilities, and tricks provided in the book will have limited success in newer versions of this platform. The authors give readers the ability to test every piece of code and every configuration. There is one major drawback: any test devices must be jailbroken.

The authors contend that if readers know the areas of weakness, they will eventually learn from them and find strategies to deal with them. For those interested in improving the security of the environment, this is a must read, but one does wonder about the logic of publicizing ways to take advantage of these vulnerabilities.

Reviewer:  Carla Sánchez Aguilar Review #: CR140909 (1305-0346)
Bookmark and Share
  Reviewer Selected
 
 
Invasive Software (D.4.6 ... )
 
 
Apple (D.3.2 ... )
 
 
Invasive Software (K.6.5 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Invasive Software": Date
A novel computer architecture to prevent destruction by viruses: volume management and system tuning
Qingshi G., Yue H., Lei L., Xu C., Honglan L. Journal of Computer Science and Technology 17(3): 241-248, 2002. Type: Article
Jun 25 2003
Defense and detection strategies against Internet worms
Nazario J., Artech House, Inc., Norwood, MA, 2003. Type: Book (9781580535373)
Sep 23 2004
Abstraction-based intrusion detection in distributed environments
Ning P. (ed), Jajodia S., Wang X. ACM Transactions on Information and System Security 4(4): 407-452, 2001. Type: Article
Jun 24 2002
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy