SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Identifying Data Leaks
in iOS ApplicationS
Many iOS applications
unintentionally leak data to
other applications or
adversaries with access to
the filesystem. This typically
occurs when a developer
uses an API that has side
effects the developer is not
aware of and, therefore,
does not take preventative
measures to secure the data.
Here we look at some of the ways
a developer using the iOS APIs
may inadvertently leak sensitive
application data.
lEAKinG DAtA
in
ApplicAtiOn
lOGS
Logging can prove to
be a valuable resource
for debugging during
development. However,
in some cases, it can leak
sensitive or proprietary
information, which is
then cached on the device
until the next reboot.
[20:29:16.6732]
requested restore
behavior: Update
[20:29:16.6743]
requested variant:
Update
[20:29:16.6752]
requested restore
behavior: Update
[20:29:16.6762]
failed to find key
FDRSupport in
variant
iDEntiFYinG
pAStEBOARD
lEAKAGE
Many developers want to
offer users the ability to
copy and paste data. If
the pasteboard is used to
copy sensitive data,
depending on how it is
implemented, data could
be leaked from the
pasteboard to other
third-party applications.
HAnDlinG
ApplicAtiOn
StAtE
tRAnSitiOnS
When an application is suspended in the
background (for example, if the user receives
an incoming call), iOS takes a snapshot of the
app and stores it in the application’s cache
directory. When the application is reopened,
the device uses the screenshot to create the
illusion that the application loads instantly.
Any system that can be paired with the device
can access the snapshot.
- (void)applicationDidEnterBackground:
(UIApplication *)application
KEYBOARD
cAcHinG
iOS customizes the autocorrect feature by caching
input that is typed into the device’s keyboard.
Almost every non-numeric word is cached on the
filesystem in plaintext in the keyboard cache file.
This means that application data you wouldn’t
want to be cached—such as usernames, passwords,
and answers to security questions—could be
inadvertently stored in the keyboard cache.
WQ E R T Y U I O P
password1pass passing
Http RESpOnSE
cAcHinG
To display a remote website, an
iOS application often uses a
UIWebView to render the
HTML content. Depending on
how the URL loading is
implemented, a UIWebView can
cache server responses to the
local filesystem. When sensitive
content is returned in server
responses, it could potentially
be stored in the cache database.
cfurl_cache_blobdata
cfurl_cache_response
cfurl_cache_receiver_data
cfurl_cache_schema_version
The Mobile
Application
Hacker’s
Handbook
by Dominic chell, tyrone Erasmus,
Shaun colley, and Ollie Whitehouse
about iOS application
vulnerabilities and how to
write secure iOS apps in
Find out more

Weitere ähnliche Inhalte

Was ist angesagt?

Securing the Insecure
Securing the InsecureSecuring the Insecure
Securing the InsecureWSO2
 
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...Edureka!
 
Penetrating Android Aapplications
Penetrating Android AapplicationsPenetrating Android Aapplications
Penetrating Android AapplicationsRoshan Thomas
 
10 Reasons Why Apple Rejects Apps From The App Store
10 Reasons Why Apple Rejects Apps From The App Store10 Reasons Why Apple Rejects Apps From The App Store
10 Reasons Why Apple Rejects Apps From The App StoreAppknox
 
Mobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsMobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsCA API Management
 
Single sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConferenceSingle sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConferenceCA API Management
 
Presentation web based application|Web designing training center in coimbator...
Presentation web based application|Web designing training center in coimbator...Presentation web based application|Web designing training center in coimbator...
Presentation web based application|Web designing training center in coimbator...Vignesh026
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Ajin Abraham
 

Was ist angesagt? (9)

Securing the Insecure
Securing the InsecureSecuring the Insecure
Securing the Insecure
 
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
 
Penetrating Android Aapplications
Penetrating Android AapplicationsPenetrating Android Aapplications
Penetrating Android Aapplications
 
10 Reasons Why Apple Rejects Apps From The App Store
10 Reasons Why Apple Rejects Apps From The App Store10 Reasons Why Apple Rejects Apps From The App Store
10 Reasons Why Apple Rejects Apps From The App Store
 
Sql injection
Sql injectionSql injection
Sql injection
 
Mobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsMobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing Passwords
 
Single sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConferenceSingle sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConference
 
Presentation web based application|Web designing training center in coimbator...
Presentation web based application|Web designing training center in coimbator...Presentation web based application|Web designing training center in coimbator...
Presentation web based application|Web designing training center in coimbator...
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
 

Andere mochten auch

There Are No “Buts” in Progressive Enhancement [Øredev 2015]
There Are No “Buts” in Progressive Enhancement [Øredev 2015]There Are No “Buts” in Progressive Enhancement [Øredev 2015]
There Are No “Buts” in Progressive Enhancement [Øredev 2015]Aaron Gustafson
 
CraftCamp for Students - Introduction to JHipster
CraftCamp for Students - Introduction to JHipsterCraftCamp for Students - Introduction to JHipster
CraftCamp for Students - Introduction to JHipstercraftworkz
 
TI04_Licencias_ Creative_ commons
TI04_Licencias_ Creative_ commonsTI04_Licencias_ Creative_ commons
TI04_Licencias_ Creative_ commonsLidia Espino
 
Redes sociales educacion
Redes sociales educacion Redes sociales educacion
Redes sociales educacion 160314
 
Что мы сделали в 2015 году?
Что мы сделали в 2015 году?Что мы сделали в 2015 году?
Что мы сделали в 2015 году?Анна Засухина
 
Market Research Diagram for PowerPoint by PoweredTemplate.com
Market Research Diagram for PowerPoint by PoweredTemplate.comMarket Research Diagram for PowerPoint by PoweredTemplate.com
Market Research Diagram for PowerPoint by PoweredTemplate.comPoweredTemplate.com
 
EDIM 510: Challenge Based Learning
EDIM 510: Challenge Based LearningEDIM 510: Challenge Based Learning
EDIM 510: Challenge Based Learningelcastil
 
Transparency in measures of scientific impact
Transparency in measures of scientific impactTransparency in measures of scientific impact
Transparency in measures of scientific impactDario Taraborelli
 
Yemen's Remote Mountain Villages
 Yemen's Remote Mountain Villages Yemen's Remote Mountain Villages
Yemen's Remote Mountain Villagesmaditabalnco
 
欧赛斯企业品牌视觉营销解决方案
欧赛斯企业品牌视觉营销解决方案欧赛斯企业品牌视觉营销解决方案
欧赛斯企业品牌视觉营销解决方案qoolupeter
 
Onboarding Designed to Engage and Delight Customers by Dan Fisher and Gerry G...
Onboarding Designed to Engage and Delight Customers by Dan Fisher and Gerry G...Onboarding Designed to Engage and Delight Customers by Dan Fisher and Gerry G...
Onboarding Designed to Engage and Delight Customers by Dan Fisher and Gerry G...Engage
 
Web 2.0: Warum virtuelle und reale Welt untrennbar miteinander verbunden sind
Web 2.0: Warum virtuelle und reale Welt untrennbar miteinander verbunden sindWeb 2.0: Warum virtuelle und reale Welt untrennbar miteinander verbunden sind
Web 2.0: Warum virtuelle und reale Welt untrennbar miteinander verbunden sindJan Schmidt
 
Sarah Hall, "The Science of Art"
Sarah Hall, "The Science of Art"Sarah Hall, "The Science of Art"
Sarah Hall, "The Science of Art"WebVisions
 

Andere mochten auch (17)

There Are No “Buts” in Progressive Enhancement [Øredev 2015]
There Are No “Buts” in Progressive Enhancement [Øredev 2015]There Are No “Buts” in Progressive Enhancement [Øredev 2015]
There Are No “Buts” in Progressive Enhancement [Øredev 2015]
 
CraftCamp for Students - Introduction to JHipster
CraftCamp for Students - Introduction to JHipsterCraftCamp for Students - Introduction to JHipster
CraftCamp for Students - Introduction to JHipster
 
TI04_Licencias_ Creative_ commons
TI04_Licencias_ Creative_ commonsTI04_Licencias_ Creative_ commons
TI04_Licencias_ Creative_ commons
 
Redes sociales educacion
Redes sociales educacion Redes sociales educacion
Redes sociales educacion
 
Что мы сделали в 2015 году?
Что мы сделали в 2015 году?Что мы сделали в 2015 году?
Что мы сделали в 2015 году?
 
Market Research Diagram for PowerPoint by PoweredTemplate.com
Market Research Diagram for PowerPoint by PoweredTemplate.comMarket Research Diagram for PowerPoint by PoweredTemplate.com
Market Research Diagram for PowerPoint by PoweredTemplate.com
 
EDIM 510: Challenge Based Learning
EDIM 510: Challenge Based LearningEDIM 510: Challenge Based Learning
EDIM 510: Challenge Based Learning
 
U.s. Immigration Demographics and Immigrant Integration
U.s. Immigration Demographics and Immigrant IntegrationU.s. Immigration Demographics and Immigrant Integration
U.s. Immigration Demographics and Immigrant Integration
 
Expo info
Expo infoExpo info
Expo info
 
Red Hat Storage 3.0
Red Hat Storage 3.0Red Hat Storage 3.0
Red Hat Storage 3.0
 
Transparency in measures of scientific impact
Transparency in measures of scientific impactTransparency in measures of scientific impact
Transparency in measures of scientific impact
 
Yemen's Remote Mountain Villages
 Yemen's Remote Mountain Villages Yemen's Remote Mountain Villages
Yemen's Remote Mountain Villages
 
欧赛斯企业品牌视觉营销解决方案
欧赛斯企业品牌视觉营销解决方案欧赛斯企业品牌视觉营销解决方案
欧赛斯企业品牌视觉营销解决方案
 
Onboarding Designed to Engage and Delight Customers by Dan Fisher and Gerry G...
Onboarding Designed to Engage and Delight Customers by Dan Fisher and Gerry G...Onboarding Designed to Engage and Delight Customers by Dan Fisher and Gerry G...
Onboarding Designed to Engage and Delight Customers by Dan Fisher and Gerry G...
 
Web 2.0: Warum virtuelle und reale Welt untrennbar miteinander verbunden sind
Web 2.0: Warum virtuelle und reale Welt untrennbar miteinander verbunden sindWeb 2.0: Warum virtuelle und reale Welt untrennbar miteinander verbunden sind
Web 2.0: Warum virtuelle und reale Welt untrennbar miteinander verbunden sind
 
Sarah Hall, "The Science of Art"
Sarah Hall, "The Science of Art"Sarah Hall, "The Science of Art"
Sarah Hall, "The Science of Art"
 
7 online branding
7 online branding7 online branding
7 online branding
 

Ähnlich wie Identifying Data Leaks in iOS Applications

Pentesting iOS Applications
Pentesting iOS ApplicationsPentesting iOS Applications
Pentesting iOS Applicationsjasonhaddix
 
Password security system for websites
Password security system for websitesPassword security system for websites
Password security system for websitesMike Taylor
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetMobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetBrent Muir
 
iOS (Vulner)ability
iOS (Vulner)abilityiOS (Vulner)ability
iOS (Vulner)abilitySubho Halder
 
Iphone app programming guide
Iphone app programming guideIphone app programming guide
Iphone app programming guideClickBank
 
Apple iPhone App Programming Guide
Apple iPhone App Programming GuideApple iPhone App Programming Guide
Apple iPhone App Programming GuideYusuf Karoma
 
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016Subho Halder
 
Android Development : (Android Studio, PHP, XML, MySQL)
Android Development : (Android Studio, PHP, XML, MySQL)Android Development : (Android Studio, PHP, XML, MySQL)
Android Development : (Android Studio, PHP, XML, MySQL)Kavya Barnadhya Hazarika
 
OWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersOWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersLewis Ardern
 
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...apidays
 
iOS Application Development Step by Step to develop an iOS App.pdf
iOS Application Development Step by Step to develop an iOS App.pdfiOS Application Development Step by Step to develop an iOS App.pdf
iOS Application Development Step by Step to develop an iOS App.pdfJPLoft Solutions
 
Digitally Record videos & Track Incidents on IPAD Application
Digitally Record videos & Track Incidents on IPAD ApplicationDigitally Record videos & Track Incidents on IPAD Application
Digitally Record videos & Track Incidents on IPAD ApplicationMike Taylor
 
Google App Engine - Overview #1
Google App Engine - Overview #1Google App Engine - Overview #1
Google App Engine - Overview #1Kay Kim
 
iOS Client Side Analysis
iOS Client Side AnalysisiOS Client Side Analysis
iOS Client Side AnalysisAadarsh N
 
Android Overview
Android OverviewAndroid Overview
Android OverviewRaju Kadam
 
Outsmarting smartphones
Outsmarting smartphonesOutsmarting smartphones
Outsmarting smartphonesSensePost
 
Hacking & Securing of iOS Apps by Saurabh Mishra
Hacking & Securing of iOS Apps by Saurabh MishraHacking & Securing of iOS Apps by Saurabh Mishra
Hacking & Securing of iOS Apps by Saurabh MishraOWASP Delhi
 
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...apidays
 
RICOH THETA x IoT Developers Contest : Cloud API Seminar
 RICOH THETA x IoT Developers Contest : Cloud API Seminar RICOH THETA x IoT Developers Contest : Cloud API Seminar
RICOH THETA x IoT Developers Contest : Cloud API Seminarcontest-theta360
 

Ähnlich wie Identifying Data Leaks in iOS Applications (20)

Pentesting iOS Applications
Pentesting iOS ApplicationsPentesting iOS Applications
Pentesting iOS Applications
 
Password security system for websites
Password security system for websitesPassword security system for websites
Password security system for websites
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetMobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring Budget
 
iOS (Vulner)ability
iOS (Vulner)abilityiOS (Vulner)ability
iOS (Vulner)ability
 
Mobile Apps Develpment - A Comparison
Mobile Apps Develpment - A ComparisonMobile Apps Develpment - A Comparison
Mobile Apps Develpment - A Comparison
 
Iphone app programming guide
Iphone app programming guideIphone app programming guide
Iphone app programming guide
 
Apple iPhone App Programming Guide
Apple iPhone App Programming GuideApple iPhone App Programming Guide
Apple iPhone App Programming Guide
 
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
 
Android Development : (Android Studio, PHP, XML, MySQL)
Android Development : (Android Studio, PHP, XML, MySQL)Android Development : (Android Studio, PHP, XML, MySQL)
Android Development : (Android Studio, PHP, XML, MySQL)
 
OWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersOWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript Developers
 
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
 
iOS Application Development Step by Step to develop an iOS App.pdf
iOS Application Development Step by Step to develop an iOS App.pdfiOS Application Development Step by Step to develop an iOS App.pdf
iOS Application Development Step by Step to develop an iOS App.pdf
 
Digitally Record videos & Track Incidents on IPAD Application
Digitally Record videos & Track Incidents on IPAD ApplicationDigitally Record videos & Track Incidents on IPAD Application
Digitally Record videos & Track Incidents on IPAD Application
 
Google App Engine - Overview #1
Google App Engine - Overview #1Google App Engine - Overview #1
Google App Engine - Overview #1
 
iOS Client Side Analysis
iOS Client Side AnalysisiOS Client Side Analysis
iOS Client Side Analysis
 
Android Overview
Android OverviewAndroid Overview
Android Overview
 
Outsmarting smartphones
Outsmarting smartphonesOutsmarting smartphones
Outsmarting smartphones
 
Hacking & Securing of iOS Apps by Saurabh Mishra
Hacking & Securing of iOS Apps by Saurabh MishraHacking & Securing of iOS Apps by Saurabh Mishra
Hacking & Securing of iOS Apps by Saurabh Mishra
 
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
 
RICOH THETA x IoT Developers Contest : Cloud API Seminar
 RICOH THETA x IoT Developers Contest : Cloud API Seminar RICOH THETA x IoT Developers Contest : Cloud API Seminar
RICOH THETA x IoT Developers Contest : Cloud API Seminar
 

Mehr von Wiley

Publisher as Strategic Partner for Societies October 2019
Publisher as Strategic Partner for Societies October 2019Publisher as Strategic Partner for Societies October 2019
Publisher as Strategic Partner for Societies October 2019Wiley
 
19 Inspiring Books by Jon Gordon
19 Inspiring Books by Jon Gordon19 Inspiring Books by Jon Gordon
19 Inspiring Books by Jon GordonWiley
 
3 Big Myths That Hold Women Back
3 Big Myths That Hold Women Back3 Big Myths That Hold Women Back
3 Big Myths That Hold Women BackWiley
 
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...Wiley
 
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...Wiley
 
A Celebration of Women's History Month
A Celebration of Women's History MonthA Celebration of Women's History Month
A Celebration of Women's History MonthWiley
 
Leadership Is for Everyone
Leadership Is for EveryoneLeadership Is for Everyone
Leadership Is for EveryoneWiley
 
The Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales SuccessThe Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales SuccessWiley
 
7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course ObjectivesWiley
 
Today's Students: 7 Powerful Facts
Today's Students: 7 Powerful FactsToday's Students: 7 Powerful Facts
Today's Students: 7 Powerful FactsWiley
 
Should you get an MBA?
Should you get an MBA?Should you get an MBA?
Should you get an MBA?Wiley
 
Valuing International Collaboration in Research
Valuing International Collaboration in ResearchValuing International Collaboration in Research
Valuing International Collaboration in ResearchWiley
 
Leadership Makes a Difference
Leadership Makes a DifferenceLeadership Makes a Difference
Leadership Makes a DifferenceWiley
 
5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WELWiley
 
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...Wiley
 
An Educator's Guide to Cheating
An Educator's Guide to CheatingAn Educator's Guide to Cheating
An Educator's Guide to CheatingWiley
 
Mine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With GapsMine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With GapsWiley
 
Get Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the ClassroomGet Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the ClassroomWiley
 
Level I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum UpdatesLevel I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum UpdatesWiley
 
6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft SkillsWiley
 

Mehr von Wiley (20)

Publisher as Strategic Partner for Societies October 2019
Publisher as Strategic Partner for Societies October 2019Publisher as Strategic Partner for Societies October 2019
Publisher as Strategic Partner for Societies October 2019
 
19 Inspiring Books by Jon Gordon
19 Inspiring Books by Jon Gordon19 Inspiring Books by Jon Gordon
19 Inspiring Books by Jon Gordon
 
3 Big Myths That Hold Women Back
3 Big Myths That Hold Women Back3 Big Myths That Hold Women Back
3 Big Myths That Hold Women Back
 
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
 
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
 
A Celebration of Women's History Month
A Celebration of Women's History MonthA Celebration of Women's History Month
A Celebration of Women's History Month
 
Leadership Is for Everyone
Leadership Is for EveryoneLeadership Is for Everyone
Leadership Is for Everyone
 
The Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales SuccessThe Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales Success
 
7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives
 
Today's Students: 7 Powerful Facts
Today's Students: 7 Powerful FactsToday's Students: 7 Powerful Facts
Today's Students: 7 Powerful Facts
 
Should you get an MBA?
Should you get an MBA?Should you get an MBA?
Should you get an MBA?
 
Valuing International Collaboration in Research
Valuing International Collaboration in ResearchValuing International Collaboration in Research
Valuing International Collaboration in Research
 
Leadership Makes a Difference
Leadership Makes a DifferenceLeadership Makes a Difference
Leadership Makes a Difference
 
5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL
 
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
 
An Educator's Guide to Cheating
An Educator's Guide to CheatingAn Educator's Guide to Cheating
An Educator's Guide to Cheating
 
Mine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With GapsMine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With Gaps
 
Get Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the ClassroomGet Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the Classroom
 
Level I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum UpdatesLevel I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum Updates
 
6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills
 

Kürzlich hochgeladen

9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRnishacall1
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 

Kürzlich hochgeladen (7)

9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 

Identifying Data Leaks in iOS Applications

  • 1. Identifying Data Leaks in iOS ApplicationS
  • 2. Many iOS applications unintentionally leak data to other applications or adversaries with access to the filesystem. This typically occurs when a developer uses an API that has side effects the developer is not aware of and, therefore, does not take preventative measures to secure the data.
  • 3. Here we look at some of the ways a developer using the iOS APIs may inadvertently leak sensitive application data.
  • 5. Logging can prove to be a valuable resource for debugging during development. However, in some cases, it can leak sensitive or proprietary information, which is then cached on the device until the next reboot. [20:29:16.6732] requested restore behavior: Update [20:29:16.6743] requested variant: Update [20:29:16.6752] requested restore behavior: Update [20:29:16.6762] failed to find key FDRSupport in variant
  • 7. Many developers want to offer users the ability to copy and paste data. If the pasteboard is used to copy sensitive data, depending on how it is implemented, data could be leaked from the pasteboard to other third-party applications.
  • 9. When an application is suspended in the background (for example, if the user receives an incoming call), iOS takes a snapshot of the app and stores it in the application’s cache directory. When the application is reopened, the device uses the screenshot to create the illusion that the application loads instantly. Any system that can be paired with the device can access the snapshot. - (void)applicationDidEnterBackground: (UIApplication *)application
  • 11. iOS customizes the autocorrect feature by caching input that is typed into the device’s keyboard. Almost every non-numeric word is cached on the filesystem in plaintext in the keyboard cache file. This means that application data you wouldn’t want to be cached—such as usernames, passwords, and answers to security questions—could be inadvertently stored in the keyboard cache. WQ E R T Y U I O P password1pass passing
  • 13. To display a remote website, an iOS application often uses a UIWebView to render the HTML content. Depending on how the URL loading is implemented, a UIWebView can cache server responses to the local filesystem. When sensitive content is returned in server responses, it could potentially be stored in the cache database. cfurl_cache_blobdata cfurl_cache_response cfurl_cache_receiver_data cfurl_cache_schema_version
  • 14. The Mobile Application Hacker’s Handbook by Dominic chell, tyrone Erasmus, Shaun colley, and Ollie Whitehouse about iOS application vulnerabilities and how to write secure iOS apps in Find out more