Overview and Mobile Device Usage
- Mobile Device Usage
- Simplified Tasks
- Required Functionality
- Constant Connectivity
- Multi-Personal Device
- User Workflow Expectations
- Lost/Stolen
Platform Overview and Integrated Controls
- Unix Base
- Integrated Security Controls
- Integrated Security Controls: Data Execution Prevention (DEP)
- Integrated Security Controls: Address Space Layout Randomization
- Integrated Security Controls: Stack Canaries
- Integrated Security Controls: Secure Enclave
- Integrated Security Controls: Closed System
- Apple Watch Additional Controls
Development and Application Structure
- SDK: iOS Architecture Layers
- SDK: High-Level APIs and Hybrid Frameworks
- Application Structure
- IPA Application Structure
- Extension Points on Apple Platforms
Common iOS Platform Issues
- Reverse Engineering
- Jailbreaking Overview
- Perspectives on Jailbreaking
- Memory Management
Platform Security Controls
- Platform Security Controls
- Application Sandboxing Introduction
- Application Sandbox
- Nonapplication Sandbox Storage Options: Introduction
- Outside Application Sandbox Storage
- Interprocess Communication (IPC): URL Scheme
- IPC Keychain Sharing (Keychain Access Groups)
- IPC: Pasteboard (Named and General)
- IPC Extensions
- Keychain and Biometric Security
- Cryptography and Certificate Management
- Privacy Controls
Application Issues: Authentication/Authorization and Communications
- Authentication
- Authentication Scenarios
- Authorization
- Communication Issues
- Interprocess Communication (IPC)
Application Issues: Input and Storage
- Data Representation and Validation
- Cryptographic Issues
- The Many Forms of Local Storage
- Data Protection: API
- Data Protection: Potential Weakness
- Leaky Databases
- Mobile Data Breaches