- Mobile Application Penetration Testing
- Vijay Kumar Velu
- 103字
- 2021-07-16 12:46:43
Hardware-level security
iOS has very tight integration between hardware and software protection. All the devices built upon the Apple A8 or A7 processors provide cryptographic support. These devices use the AES (short for American Encryption Standard) 256 cryptographic engine and are built into a Direct Memory Access (DMA) path between the flash and main system memory. All devices are provided with a UID along with a device Group ID (GID), both of which are compiled at the processor level. A person testing the firmware will only be able to see the encryption and decryption of these techniques and will not have direct access.
推薦閱讀
- Python數據挖掘:入門、進階與實用案例分析
- Google Visualization API Essentials
- Word 2010中文版完全自學手冊
- Java Data Science Cookbook
- INSTANT Cytoscape Complex Network Analysis How-to
- 大數據營銷:如何讓營銷更具吸引力
- 智能數據分析:入門、實戰與平臺構建
- 數亦有道:Python數據科學指南
- Python金融數據分析(原書第2版)
- 數據科學工程實踐:用戶行為分析與建模、A/B實驗、SQLFlow
- 云數據中心網絡與SDN:技術架構與實現
- HikariCP連接池實戰
- Hadoop 3實戰指南
- 區塊鏈+:落地場景與應用實戰
- Access數據庫開發從入門到精通