Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Introduction
Overview of This Book
How This Book Is Organized
Who Should Read This Book
Tools You Will Need
What's on the Website
Chapter 1 Mobile Application (In)security
The Evolution of Mobile Applications
Mobile Application Security
Summary
Chapter 2 Analyzing iOS Applications
Understanding the Security Model
Understanding iOS Applications
Jailbreaking Explained
Understanding the Data Protection API
Understanding the iOS Keychain
Understanding Touch ID
Reverse Engineering iOS Binaries
Summary
Chapter 3 Attacking iOS Applications
Introduction to Transport Security
Identifying Insecure Storage
Patching iOS Applications with Hopper
Attacking the iOS Runtime
Understanding Interprocess Communication
Attacking Using Injection
Summary
Chapter 4 Identifying iOS Implementation Insecurities
Disclosing Personally Identifiable Information
Identifying Data Leaks
Memory Corruption in iOS Applications
Summary
Chapter 5 Writing Secure iOS Applications
Protecting Data in Your Application
Avoiding Injection Vulnerabilities
Securing Your Application with Binary Protections
Summary
Chapter 6 Analyzing Android Applications
Creating Your First Android Environment
Understanding Android Applications
Understanding the Security Model
Reverse-Engineering Applications
Summary
Chapter 7 Attacking Android Applications
Exposing Security Model Quirks
Attacking Application Components
Accessing Storage and Logging
Misusing Insecure Communications
Exploiting Other Vectors
Additional Testing Techniques
Summary
Chapter 8 Identifying and Exploiting Android Implementation Issues
Reviewing Pre-Installed Applications
Exploiting Devices
Infiltrating User Data
Summary
Chapter 9 Writing Secure Android Applications
Principle of Least Exposure
Essential Security Mechanisms
Advanced Security Mechanisms
Slowing Down a Reverse Engineer
Summary
Chapter 10 Analyzing Windows Phone Applications
Understanding the Security Model
Understanding Windows Phone 8.x Applications
Building a Test Environment
Analyzing Application Binaries
Summary
Chapter 11 Attacking Windows Phone Applications
Analyzing for Data Entry Points
Attacking Transport Security
Attacking WebBrowser and WebView Controls
Identifying Interprocess Communication Vulnerabilities
Attacking XML Parsing
Attacking Databases
Attacking File Handling
Patching .NET Assemblies
Summary
Chapter 12 Identifying Windows Phone Implementation Issues
Identifying Insecure Application Settings Storage
Identifying Data Leaks
Identifying Insecure Data Storage
Insecure Random Number Generation
Insecure Cryptography and Password Use
Identifying Native Code Vulnerabilities
Summary
Chapter 13 Writing Secure Windows Phone Applications
General Security Design Considerations
Storing and Encrypting Data Securely
Secure Random Number Generation
Securing Data in Memory and Wiping Memory
Avoiding SQLite Injection
Implementing Secure Communications
Avoiding Cross-Site Scripting in WebViews and WebBrowser Components
Secure XML Parsing
Clearing Web Cache and Web Cookies
Avoiding Native Code Bugs
Using Exploit Mitigation Features
Summary
Chapter 14 Analyzing BlackBerry Applications
Understanding BlackBerry Legacy
Understanding BlackBerry 10
Understanding the BlackBerry 10 Security Model
BlackBerry 10 Jailbreaking
Using Developer Mode
The BlackBerry 10 Device Simulator
Accessing App Data from a Device
Accessing BAR Files
Looking at Applications
Summary
Chapter 15 Attacking BlackBerry Applications
Traversing Trust Boundaries
Summary
Chapter 16 Identifying BlackBerry Application Issues
Limiting Excessive Permissions
Resolving Data Storage Issues
Checking Data Transmission
Handling Personally Identifiable Information and Privacy
Ensuring Secure Development
Summary
Chapter 17 Writing Secure BlackBerry Applications
Securing BlackBerry OS 7.x and Earlier Legacy Java Applications
Securing BlackBerry 10 Native Applications
Securing BlackBerry 10 Cascades Applications
Securing BlackBerry 10 HTML5 and JavaScript (WebWorks) Applications
Securing Android Applications on BlackBerry 10
Summary
Chapter 18 Cross-Platform Mobile Applications
Introduction to Cross-Platform Mobile Applications
Bridging Native Functionality
Exploring PhoneGap and Apache Cordova
Summary
Title page
Copyright
Dedication
About the Authors
About the Technical Editor
Credits
Acknowledgments
EULA
← Prev
Back
Next →
← Prev
Back
Next →