- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 307字
- 2021-06-24 16:39:05
The iOS architecture
iOS is an intermediary between the device hardware components and the applications on the screen. The applications don't interact with the underlying hardware directly. Instead, they do it through a well-defined system interface that protects them from hardware changes. This abstraction makes it easy to build applications that work on devices with different hardware capabilities.
The iOS architecture consists of four layers: the Cocoa Touch layer, the Media layer, the Core Services layer, and the Core OS layer. Each layer consists of several frameworks that help to build an application, as illustrated in the following diagram:
These layers can be described as follows:
Cocoa Touch: This layer contains the key frameworks required to develop the visual interface for iOS applications. Frameworks in this layer provide the basic application infrastructure and support key technologies, such as touch-based input, multitasking, and many high-level system services.
Media: This layer provides the graphics, audio, and video frameworks to create the best multimedia experience available on a mobile device. The technologies in this layer help developers to build applications that look and sound great.
Core Services: This layer provides the fundamental system services that are required for the applications. Not all of these services are used by developers, though many parts of the system are built on top of them. This layer contains technologies that enable support for location services, iCloud, and social media.
Core OS: This layer is the base layer and sits directly on top of the device hardware. This layer deals with low-level functionalities and provides services such as networking (Berkeley Software Distribution (BSD) sockets), memory management, threading (Portable Operating System Interface (POSIX) threads), filesystem handling, external accessories access, and Inter Process Communication (IPC).
Now that we have learned about the iOS architecture, let's have a look at iOS security.
- 數(shù)據(jù)恢復(fù)方法及案例分析
- 數(shù)字身份與元宇宙信任治理
- API安全實戰(zhàn)
- 特種木馬防御與檢測技術(shù)研究
- Practical Network Scanning
- 信息系統(tǒng)安全檢測與風(fēng)險評估
- 網(wǎng)絡(luò)安全意識導(dǎo)論
- 黑客攻防與無線安全從新手到高手(超值版)
- API攻防:Web API安全指南
- Spring Security(Third Edition)
- 物聯(lián)網(wǎng)安全滲透測試技術(shù)
- Instant Java Password and Authentication Security
- Mastering Reverse Engineering
- 構(gòu)建新型網(wǎng)絡(luò)形態(tài)下的網(wǎng)絡(luò)空間安全體系
- Mastering Linux Security and Hardening