J. Benjamin, How to jailbreak iOS 7.1.x with Pangu 1.1 on Windows , iDownloadBlog, 2014.

C. D. Orazio, A. Ariffin, and K. Choo, iOS anti-forensics: How can we securely conceal, delete and insert data?, Proceedings of the Forty- Seventh Hawaii International Conference on System Sciences, pp.4838-4847, 2014.

S. Esser, Exploiting the iOS kernel, presented at Black Hat USA, 2011.

P. Gianchandani, iOS Application Security Part 2 ? Getting Class Information of iOS Apps, 2014.

. Github, Tools for securely clearing and validating iOS application memory (github.com/project-imas/ memory-security, p.2014

S. and G. Selma, Hacking iOS on the run: Using Cycript, presented at the RSA Conference, 2014.

A. Hoog and K. Strzempka, iPhone and iOS Forensics: Investigation , Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices, 2011.

C. Miller, Owning the fanboys: Hacking Mac OS X, presented at Black Hat Japan, 2008.

C. Miller, Mobile Attacks and Defense, IEEE Security & Privacy Magazine, vol.9, issue.4, pp.68-70, 2011.
DOI : 10.1109/MSP.2011.85

S. Morrissey, iOS Forensic Analysis for iPhone, iPad and iPod Touch, 2010.
DOI : 10.1007/978-1-4302-3343-5

M. Renard, Practical iOS apps hacking, Proceedings of the First International Symposium on Grey-Hat Hacking, pp.14-26, 2012.

B. Satish, Penetration Testing for iPhone Applications ? Part 5, 2013.

A. Smith, Smartphone Ownership 2013, Pew Research Center, 2013.

B. Trebitowski, Beginning Jailbroken iOS Development ? Building and Deployment, Pixegon, Albuquerque, New Mexico (brandon treb.com/beginning-jailbroken-ios-development-buildingand-deployment ), 2011.

R. Verma, J. Govindaraj, and G. Gupta, Preserving Dates and Timestamps for Incident Handling in Android Smartphones, Advances in Digital Forensics X, pp.209-225, 2014.
DOI : 10.1007/978-3-662-44952-3_14

URL : https://hal.archives-ouvertes.fr/hal-01393772