iPhone - The iPhone A Case for Software Security Dwayne...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
The iPhone: A Case for Software Security Dwayne Bates
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Acknowledgements Graham Cluley’s Blog http://www.sophos.com/blogs/gc/g/2009/11 /03/hacked-iphones-held-hostage-5-euros/ Nicolas Seriot (SpyPhone)- http://seriot.ch/blog.php?article=20100203 Apple’s Developer Site- developer.apple.com
Background image of page 2
Overview What is the iPhone? History of Privacy Issues for the iPhone Spyware and the iPhone iPhone Applications How did this information affect the development process? Closing Remarks References
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What is the iPhone? Features: iPod Phone Internet QuickTime™ and a  decompressor are needed to see this picture.
Background image of page 4
Security Overview History of Security and Privacy Issues: Root exploits and Personal Data Harvesting Jailbreaking and Worms
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security Overview cont.'d. . Spyware and the iPhone: SpyPhone /var/mobile/Library/Keyboard/ / var/mobile/Library/Preferences/com.apple.accoun tsettings.plist / var/mobile/Library/Preferences/com.apple.commc enter.plist / var/mobile/Library/Preferences/com.apple.mobile phone.settings.plist / var/mobile/Library/Preferences/com.apple.mobile
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/13/2011 for the course CSCE 548 taught by Professor Farkas during the Spring '10 term at South Carolina.

Page1 / 19

iPhone - The iPhone A Case for Software Security Dwayne...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online