[1]
|
C. Maxcer, “Apple Minus AT&T Equals Lots of iPhones Somewhere Else,” Mac News World. http://www.mac- newsworld.com/story/61389.html?welcome=1209968031
|
[2]
|
iPhone, Apple–iPhone. http://www.apple.com/iphone/
|
[3]
|
ARM, ARM1176 Processor. http://www.arm.com/products/CPUs/ARM1176.html
|
[4]
|
A. L. Shimpi, “Apple’s iPhone Dissected: We did it, so you don’t have to,” Anandtech, 29 June 2007. http://www. anandtech.com/mac/showdoc.aspx?i=3026&p=3
|
[5]
|
In brief, Network Security, Vol. 2009, No. 7, July 2009, pp. 3.
|
[6]
|
Best iPhone Apps. http://www.Installerapps.com
|
[7]
|
K Dunham, “Mobile Malware Attacks and Defense,” Elsevier 2009, pp. 197-265.
|
[8]
|
B. Haines, “Seven Deadliest Wireless Technologies Attacks,” Syngress, 2010.
|
[9]
|
Max Console. http://www.maxconsole.net/?mode=news& newsid= 9516
|
[10]
|
Common Vulnerabilities and Exposures, 2006. http://cve. mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3459
|
[11]
|
TIFF Library and Utilities, 15 January 2008. http://www. libtiff.org/
|
[12]
|
National Vulnerability Database, 2006. http://nvd.nist. gov/nvd.cfm?cvename=CVE-2006-3459
|
[13]
|
“Stack buffer overflow,” Wikipedia. http://en.wikipedia. org/wiki/Stack_buffer_overflow
|
[14]
|
M. Stamp, “Information Security: Principles and Practice,” Wiley 2005.
|
[15]
|
C. Cowan, et al., “StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks,” Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, January 26-29, 1998.
|
[16]
|
“Return-to-libc,” Wikipedia. http://en.wikipedia.org/wiki/ Return-to-libc
|
[17]
|
Maptools, 15 January 2008. http://dl.maptools.org/dl/lib- tiff/
|
[18]
|
Adobe Developers Association, TIFF Revision 6.0 Final, 3 June 1992. http://partners.adobe.com/public/developer/ en/tiff/TIFF6.pdf
|
[19]
|
“Tagged Image File Format,” Wikipedia. http://en.wiki- pedia.org/wiki/TIFF
|
[20]
|
Simple Machines, The ARM instruction set. http://www. simplemachines.it/doc/arm_inst.pdf
|
[21]
|
“1176JZF-S Technical Reference Manual Revision r0p7,” ARM. http://infocenter.arm.com/help/topic/com. arm.doc.ddi0301g/DDI0301G_arm1176jzfs_r0p7_trm.pdf
|
[22]
|
“Little-endian,” Wikipedia. http://en.wikipedia.org/wiki/ Little_endian
|
[23]
|
Toc2rta, TIFF exploit. http://www.toc2rta.com/files/itiff_ exploit.cpp
|
[24]
|
“Bloodhound.Exploit.166 Technical Details,” Symantec, 9 November 2007.
|
[25]
|
V. Pandya., IPhone security analysis, Masters Thesis, Department of Computer Science, San Jose State University, 2008. http://www.cs.sjsu.edu/faculty/stamp/students/ pandya_vaibhav.pdf
|
[26]
|
Metasploit. http://www.metasploit.com
|
[27]
|
iPhone UnlockUSA.com. http://iphone.unlock.no
|
[28]
|
iPhone Sim Free. http://www.iphonesimfree.com
|
[29]
|
Hackintosh, Turbosim Technical Background. http:// hackint0sh.org/forum/showthread.php?t=18048
|
[30]
|
Hackintosh, iPhone. http://www.hackint0sh.org
|
[31]
|
G. Hotz, “On the iPhone,” 15 February 2008. http:// iphonejtag.blogspot.com/
|
[32]
|
C. Miller, J. Honoroff and J. Mason, “Security Evaluation of Apple’s iPhone,” Independent Security Evaluators, 19 July 2007. http://securityevaluators.com/files/papers/exploitingiphone.pdf
|
[33]
|
The Webkit Open Source Project. http://webkit.org/
|
[34]
|
Perl Compatible Regular Expressions, Change log. http:// www.pcre.org/changelog.txt
|
[35]
|
C. Miller, “Hacking Leopard: Tools and Techniques for Attacking the Newest Mac OS X,” Black Hat Media Archives, 2 August 2007. https://www.blackhat.com/pres- entations/bh-usa-07/Miller/Presentation/bh-usa-07-miller. pdf
|