Table of Contents
Chapter 1: iOS Security Basics
How Apple Protects the App Store
Understanding Security Threats
Understanding the iOS Security Architecture
A Brief History of iOS Attacks
Chapter 2: iOS in the Enterprise
Chapter 4: Code Signing and Memory Protections
Understanding Mandatory Access Control
Understanding Application Signing
How Code Signing Enforcement Works
Discovering Dynamic Code Signing
Understanding the Sandbox Implementation
Chapter 6: Fuzzing iOS Applications
Understanding the iOS System Allocator
Chapter 8: Return-Oriented Programming
What Can You Do with ROP on iOS?
Examples of ROP Shellcode on iOS
Chapter 9: Kernel Debugging and Exploitation
Kernel Extensions and IOKit Drivers
Understanding the Jailbreaking Process