O'Reilly logo

Mobile Application Penetration Testing by Vijay Kumar Velu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Apple's iOS security model

Before we jump to iOS apps in detail, it is vital to understand the fundamental security features of the iOS platform, which are crucial during app assessment.

The following diagram shows the security architecture of an iOS device and also provides an overview of security features implemented from the hardware level to software stack:

Apple's iOS security model

Roughly, we can split the iOS security model into these layers:

  • Device-level security
  • System-level security
  • Data-level security
  • Network-level Security
  • Application-level security
  • Hardware-level security

Device-level security

At the device level, the security model ensures that unauthorized personnel ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required