From the course: Ethical Hacking: Mobile Devices and Platforms

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Securing iOS applications by design

Securing iOS applications by design - iOS Tutorial

From the course: Ethical Hacking: Mobile Devices and Platforms

Start my 1-month free trial

Securing iOS applications by design

- [Instructor] The iOS operating system is designed to be secure. And the way in which Apple manages applications provides additional security over their supply. Security in iOS starts when the user switches on the device. The Boot ROM hardware contains read-only code to bootstrap the system and Apple's public key. The public key is used to verify the integrity of the second stage low-level boot code. The low-level boot takes the second stage boot load, known as iBoot, from flash memory and verifies its signature before loading it. Similarly, the iBoot verifies the integrity of the kernel before loading it. This provides a fully secure startup through to kernel, and the remainder of the operating system can then be loaded. The operating system provides a number of features able to be used by application developers to secure their code. Unfortunately, not all developers use these to their fullest extent, which is why we test applications. We've already seen that applications operate…

Contents