<<

Are Apple’s Security Measures Sufficient to Protect Its Mobile Devices?

Galen A. Grimes Department of Information Sciences and Technology Penn State University – Greater Allegheny Campus McKeesport, PA, USA [email protected]

Abstract—Apple Computer’s iPad tablet computer 2011 Apple had sold more than 25 million has taken a commanding lead in the tablet market worldwide making it the undeniable leader in the and history has shown that whenever a computer tablet market [4]. platform becomes dominant, it also becomes a target for malicious intruders and malware. Apple The iPad runs the iPhone Operating System computers have long been touted as being safer (iPhone OS, or simply iOS) which enables it to from malware than their Windows counterparts, likewise run the more than 550,000+ available largely because of their smaller market share. This iPhone applications (called “apps” for short) in paper examines the current state of security for the addition to the more than 140,000+ apps iPad and mobile devices running Apple’s iPhone designed specifically for the iPad with its larger Operating System. Does the iPad have any vulnerabilities that need to be addressed by Apple, screen and more powerful processor. Missing for or is it as safe and malware-proof as some Apple a long time, however, from this mega-catalog of devotees attest? utilities, productivity apps, and games are two apps that most security experts would deem Keywords-iPad; iPhone; malware; mobile essential on any other computer system: an devices; security; antivirus app and a firewall app. The first of I. INTRODUCTION these gaps was filled in July of 2011 when the security vendor Intego released VirusBarrier iOS Apple has long touted its seemingly for the iPhone, iPod, and iPad, making it the first invulnerability to malware on both of its anti-virus app for Apple mobile devices [5]. platforms—Mac OS X and iPhone Operating System. The debate on the invulnerability of the The VirusBarrier app is not a full-featured Mac OS X platform has two major camps. The application like you might utilize on your first faction contends that Mac OS X is based on desktop or laptop; but it will allow you to an inherently superior software design than manually scan in email attachments and Microsoft Windows, and this superior design files imported to your mobile device via makes it more resistant to malware [1]. This DropBox. It will also allow you to manually scan group also largely dismisses the contention of files on web sites you frequent, your iDisk in the other faction, which contends that virus your MobileMe account, and FTP or WebDAV writers haven’t targeted Macs because Apple sites. lacks market-share. The argument from the other camp goes that Windows dominates the But there is still little reason for most iOS users worldwide PC market with Windows operating to worry about malware. To date, only five iOS on roughly 90-95% of all personal computers pieces of malware have been identified ever [6] and thus virus writers get more "bang for their [7]. buck" by going after the "largest fish in the Even though Apple’s mobile products still lack a ocean" [2]. firewall app, Mac OS X since its inception has If you agree with the market share argument, included a firewall and numerous third-party then Apple seemingly has created a new target vendors have created and successfully promoted for malicious hackers. The Apple iPad in its first antivirus/security software for the Mac OS X two months took a commanding lead in the tablet platform, such as Symantec, McAfee, Sophos, computer race selling more than 2 million units and Intego even though very few verifiable [3]. Apple exceeded sales predictions in 2010 by pieces of malware have been identified including selling more than 10 million iPads. By June of

978-1-4577-0580-9/12/$26.00 ©2012 IEEE a report last year about malicious spyware found security researchers reported today. in a third party screensaver [8]. According to U.K-based antivirus vendor Sophos and U.S. Mac security company Intego, Mac OS X Some security experts still recommend using 10.6.4, which Apple released this past Tuesday, antivirus/security software on Mac OS X to includes an update to XProtect. prevent Macs from becoming carriers and Dubbed that because the malware signatures are spreaders of malware even if they are impervious contained within Snow Leopard's "XProtect.plist" to the mostly Windows-based malware [9]. Macs file, the feature debuted in August 2009 with the are still able to forward emails containing launch of Mac OS X 10.6. At the time, Apple included detection for only two pieces of malware, malware without themselves becoming infected. Trojan horses named "RSPlug.a" and "Iservice" by From a design perspective, Mac OS X and iOS Symantec [11]. are in a much better position to fend off malware Apple developers use the same “sandboxing” than Windows. Apple maintains a much more memory management techniques to control closed and controlled hardware and software program and data access inside iOS as explained environment with Mac OS X and iOS than does in the iPhone Application Programming Guide. Microsoft with its Windows OS. While For security reasons, iPhone OS restricts an Windows is designed to run on a seemingly application (including its preferences and data) to endless array of hardware devices, i.e., PCs, a unique location in the file system. This netbooks, smartphones, etc., from an equally restriction is part of the security feature known as endless number of vendors, Mac OS X and iOS the application’s “sandbox.” The sandbox is a set of fine-grained controls limiting an application’s operate on a very small and tightly controlled list access to files, preferences, network resources, of hardware devices all controlled by Apple. hardware, and so on. In iPhone OS, an application and its data reside in a secure location that no other application can access. [12]. II. APPLE’S SECURITY DESIGN However, the developers warn that the iOS Apple’s approach to security is as controlled as sandbox does not provide absolute protection its closed hardware environment. Within Mac against attackers. OS X, Apple uses a protected memory The sandbox limits the damage an attacker can environment that its developers call cause to other applications and to the system, but it cannot prevent attacks from happening. In other “sandboxing”. words, the sandbox does not protect your With virtually no effort on your part, Mac OS X application from direct attacks by malicious offers a multilayered system of defenses against entities. For example, if there is an exploitable viruses and other malicious applications, or buffer overflow in your input-handling code and malware. For example, it prevents hackers from you fail to validate user input, an attacker might harming your programs through a technique still be able to crash your program or use it to called “sandboxing” — restricting what actions execute the attacker’s code [13]. programs can perform on your Mac, what files they can access, and what other programs they can Attacks against Apple’s Mac OS X security launch. Other automatic security features include posture are not merely centered on whether the Library Randomization, which prevents malicious OS is vulnerable to malware. The hacker group commands from finding their targets, and Execute that launched the attack against AT&T revealing Disable, which protects the memory in your Mac from attacks [10]. the email addresses of more than 100,000 iPad owners has also revealed security flaws in the In a nutshell, Apple developers have isolated Web browser, which is installed on both operations in the OS to prevent one program and Mac OS X and iOS. its associated data from accessing another According to [Escher] Auernheimer, Goatse program and its associated data, thus providing Security released an overflow exploit for Safari built-in protection against malware. As secure as back in March. Apple patched the vulnerability this model appears, Apple developers are still for the desktop, but not for the iPad: "This bug we aware that it is not totally bulletproof and include crafted allows the viewer of a Web page to become a proxy (behind corporate and code to protect against malware. In June of 2011 government firewalls!) for spamming, exploit Apple developers quietly added additional anti- payloads, password bruteforce attacks, and other malware code to Snow Leopard (Mac OS X undesirables. The kicker is that this attack cannot 10.6.x). be detected by any current IDS/IPS system. We released this in March, mind you, and Apple still Ten months after it debuted rudimentary malware hasn't got around to patching this on the iPad!" scanning in Snow Leopard, Apple this week quietly Auernheimer wrote [14]. added a signature for a third piece of malware,

978-1-4577-0580-9/12/$26.00 ©2012 IEEE But the biggest concern about Apple’s security or patching, the iBoot and operating system vulnerability involves and iPads where kernel in this process, rendering them unable to do the digital signature checks that evaluate and the users have run software to “jailbreak” the distinguish authorized or unauthorized software devices. [16]. The iPad was actually jailbroken using a fairly lengthy process, which involves replacing plists III. THE JAILBREAKING SECURITY DILEMMA [property lists] on the device using replacement of files using a loosely checked backup over USB Jailbreaking is the term used to describe iPhones process. Carefully crafted files can be placed on and iPads in which the users have run software the filesystem that are run and the outcome is that to modify the operating system. This dyld [dynamic library loader daemon] can be encouraged to load codeless dylibs [dynamic modification allows iPhone users in the USA and libraries] into various processes at runtime, elsewhere to subscribe to a carrier other than the eventually leading into a kernel exploit then the carriers authorized by Apple (in the USA that kernel can be patched in memory, and then all would include AT&T, Verizon, and Sprint) and sorts of fun can happen, leading to the 'jailbreaking' of the device of course any Apple more importantly it allows users of both devices placed security checks (in each stage) can be to run “un-authorized” apps on the devices. Un- patched out. The iPad hacks are considered authorized apps are apps acquired outside of userland [client side] exploits [17]. Apple’s online App Store. There are several PandaLabs, the anti-malware laboratory of Panda hacker groups and commercial operations that Security has established that jailbreaking not provide both free and commercial jailbreaking only allows un-authorized apps to run on the software. Jailbreaking advocates say removing iPhone and iPad, but jailbreaking also allows the restriction of only running Apple approved malware to run on these devices because the apps gives users more control over their devices. chain of trust created when these devices boot Users who jailbreak can download apps that allow has been broken. you to customize everything on the device from your homescreen images to your icons. You can Despite the fact that Apple has made it impossible also multitask by running apps in the background, to install peripherals and software outside of those tether your iPad to your PC to use it as a modem, found in its own App Store, cyber-criminals have even turn your device into a “MiFi” hotspot. found a way to infect jailbroken iPad devices with Those are just the highlights, though. The malware. All malware designed for iPhones, such jailbreak application stores (there are several, like as the iPhone/Eeki.A worm that PandaLabs , Icy and RockYourPhone, for example) warned about last year, will have the same ability have apps that let you do pretty much anything. to infect and spread to iPad devices due to the Here, there really are “apps for that,” when “that” iPad and the iPhone sharing the same operating is something Apple would rather you not do [15]. system, known as iOS [18]. Despite the so-called advantages in jailbreaking, Apple engineers also carefully monitor the operation is not without its pitfalls. The jailbreaking software to keep abreast of the normal operating system boot procedure for techniques that are used and if they are either the iPhone or iPad establishes a “chain of uncovering potential exploits in iOS. trust” among the booting components and the Apple Inc has plugged a hole in the software that various apps installed on the device. runs iPhones, iPads and iPod Touch players that could allow hackers to take remote control of When an iPhone boots up, it walks through a those devices. "chain of trust," which is a series of signature checks among software components always done The security flaw came to light nine days ago as in a specific order. It begins with boot ROM, the website www.jailbreakme.com released code moves on to loading low-level bootloader (LLB) that Apple customers can use to modify the iOS software (which controls general data storage and operating system that runs those devices through a transfer between computers and digital devices, in process known as "jail breaking." this case flash memory), then iBoot, then the The jailbreaking code exploited a vulnerability in operating system kernel, and finally the operating iOS that had not previously been disclosed. Its system kernel loads the user applications. As the release gave criminal hackers a blueprint they chain of trust is executed, checks are being done could use to build malicious software that would for any unauthorized software [16]. exploit the vulnerability [19]. This chain of trust insures that only authorized and safe programs are allowed to run on the device. In order to jailbreak an iPhone or iPad IV. IOS VULNERABILITIES VS. ANDROID OS the user has to break this chain of trust. VULNERABILITIES When you jailbreak an iPhone you're modifying,

978-1-4577-0580-9/12/$26.00 ©2012 IEEE Jailbreaking has become a fairly simple task. limited to iPhones; iPad users need to be on the There are dozens of websites offering lookout, too" [21]. jailbreaking solutions ranging from free to There is no evidence yet that any jailbreaking minimally priced commercial jailbreaking and/or software has been infected with malware, and carrier-breaking software, not to mention the from all anecdotal indications most users of dozens of video how-to-do-its on YouTube. jailbreaking software seemed very pleased with Some advertise jailbreaking can be completed in both the ease of use of the software and the no more than 20 seconds. Jailbreaking software results of jailbreaking their devices. There is also is available on Windows, Mac OS X, and Linux no reliable indicator of what percentage of platforms since all of the jailbreaking software iPhone or iPad users have jailbroken their discovered so far requires a computer to connect devices. There are some indications that a high to the device being jailbroken. percentage of jailbroken devices are overseas, The first conclusion many iPhone and iPad users primarily in markets where Apple is not yet might draw is that the simple way to keep your officially selling iPhones and iPads and users are device safe from this type of malware attack is to acquiring the devices from sources such as eBay simply not jailbreak your mobile device. and Craigslist. What we are likely to see in the near future is the While iOS by design does attempt to address combination of jailbreaking software and many of the security concerns around malware, malware—in effect, using jailbreaking software little has been said in the mainstream media as the delivery mechanism for malware. Most about the potential security vulnerabilities likely this would come in the form of malware inherent in the Android OS because of its open attacking the host PC (the computer used to sync source design, especially considering the size of information to the iPhone or iPad). This is a the Android OS market share. likely scenario considering the vast amount of . . . in May this year we've seen the Man in the malware in the Windows environment and Mobile (MitMo) malware - which has previously attacked Symbian, Blackberry, and Windows considering that a significant number of Mac and phones - being ported to Android as well," he Linux users still do not utilize antivirus software adds. in the mistaken belief that their computers are And the Apple iOS platform Boodaei, is immune to malware [20]. also not as safe as people think, as a jailbroken iOS device does not enforce access control - as It is also conceivable that a malicious hacker seen on the iTunes app portal - and allows any could purposely and surreptitiously application to do whatever it likes on the device. include/infect jailbreaking code with malware Unfortunately, he says, many users jailbreak their and then simply distribute the software as a new devices as they want to run all sorts of jailbreaking application. Once you connect your applications that are not on the iTunes . iPhone or iPad to your PC and run a jailbreaking "But what's more unfortunate is that application there is no way to determine what vulnerabilities in iOS could allow malicious has been done to your device until it is too late. websites to jailbreak a device and infect it with Right now iPhone and iPad users who jailbreak malware without the user's consent or their devices are blindly trusting the developers knowledge", he says [22]. from whom they acquired their jailbreaking Google does not subject Android apps submitted application. to its market distribution site to the same rigors Jailbreakme.com 3.0 exploits a vulnerability in as does Apple for apps submitted to the iTunes the PDF reader. The iOS Safari browser App Store, and Google has on several occasions downloads a PDF file that triggers a vulnerability had to remove malware-infected apps from its in how the built-in PDF reader handles a certain distribution site. font type. "This is what installs the actual jailbreak," explains Stephan Chenette, manager of Google has removed nearly two dozen malware- security research at Websense, a content security infected apps from its official Android Market in company. the last several days, a security company said Sunday. So why is it so dangerous? An attacker can reverse engineer Jailbreakme.com 3.0 to silently So far this year, Google has yanked more than install malicious code through the browser or 100 malicious Android apps from its download email attachment. "Then the attacker could gain distribution channel [23]. full control of the iPhone, iPad or other iOS device and install everything from a keylogger to …any app on affected devices that requests a a full-blown bot," Chenette says. "This isn't just single android.permission.INTERNET (which is

978-1-4577-0580-9/12/$26.00 ©2012 IEEE normal for any app that connects to the web or Are financial apps on mobile devices destined to shows ads) can get its hands on: be the next target of malicious hackers? the list of user accounts, including email • It was found that Zues [sic], the notorious addresses and sync status for each malicious code that steals online banking • last known network and GPS locations and a information, also operates in various mobile limited previous history of locations environments. The malicious code called Zitmo • phone from the phone log (Zues [sic] In The Mobile) was first discovered in • SMS data, including phone numbers and Symbian and Blackberry, and is recently found in encoded text (not sure yet if it's possible to the Android Platform. Zitmo in Android has decode it, but very likely) disguised itself as an online banking security • system logs (both kernel/dmesg and product. It taps text transmission history to app/logcat), which includes everything your penetrate a two-factor authentication system that running apps do and is likely to include requires two factors, including OTP (One Time email addresses, phone numbers, and other Password) and text messaging, for authentication private info [24]. [26]. But Google may be facing a much more difficult Predictions of attacks on smartphones and task in its attempt to shore up its vulnerable OS. mobile devices don’t just include attacks seeking A simple conclusion to be drawn is that Android your financial information. These attacks can suffers from security flaws. It appears that a lack also take the form of malware that perform direct of trusted digital signatures for apps in Android is billing on your wireless account. These types of a problem. Use of an insecure Java-based virtual attacks are predicted to explode in number. machine to execute apps may also be an issue. In Android, fixing security issues is problematic Malicious applications that perform direct billing because a different version for each carrier, were the bulk of Android based threats in 2011. manufacturer and model is required. Further, This type of malware exploits the fact that the many Android devices use insecure and old smartphone OS includes calling and texting versions of the operating system. It appears functions by using premium call settings. When Android may become more vulnerable as the the device is infected with this type of malware, it sophistication of tools that allow for automatic sends text to a certain number that repackaging of legitimate apps to add malware, generates a premium fee to the sender without allow malware to hide in advertisements, and permission from the user. Android- allow botnets to steal data increases [25]. Trojan/Pavelsms is the most recently malicious code discovered in a scam app, which is also known as the 'ruFraud' [26]. V. CONCLUSION Fortunately, iOS is not susceptible to these types With the increased popularity of smartphones of attacks because it requires user confirmation due in large part to the increased functionality for premium-rate SMS messages. But this does and the proliferation of more sophisticated apps, not mean iOS is immune to other types of direct especially financial apps, the next wave of billing and financial attacks. According to Felt et malware attacks is predicted to favor the same al, “we think that credential theft, credit card target paradigm as have malware developers who theft via NFC [Near Field Communication], and have spent the last two decades targeting advertising click fraud are the most likely to be Windows-based computers—you go where you targeted by future malware authors” [6]. are likely to get the most bang for your buck. Attacking through fraudulent apps is also And in the immediate future that would appear to expected to see an increase in the future. Apple be the Android platform since Android in all its for now seems to be avoiding many of the flavors commands 47 percent of the smartphone pitfalls that have befallen Android, and to a market [28], and because Android seems to be lesser degree Symbion, by including in its app the most vulnerable, and for now continues to approval process human review before an app is divert this unwanted attention away from included in the App Store. Apple’s iOS. And finally, there is the threat of root exploits, But Apple can’t expect Google and Android to the whole impetus of the jailbreak phenomenon. continue to divert attention away from its OS While a significant number of users want to forever. Because of the increased use of customize their smartphones beyond what the smartphones and other mobile devices in the manufacturers authorize by utilizing root corporate setting, and because of the increased exploits, so too do malware authors have an development and use of more sophisticated incentive to find and utilize these same root financial apps, Apple is certainly moving its OS exploits. Unfortunately, it is not terribly difficult into the crosshairs. for malware authors to discover smartphone root

978-1-4577-0580-9/12/$26.00 ©2012 IEEE exploits since many are published by the http://www.zdnet.com/blog/security/malware-watch-free- homebrew community in an attempt to help mac-os-x-screensavers-bundled-with-spyware/6560 owners of smartphones in their efforts to [9] Stern, Z., Who’s Afraid of a Cute Little Virus?, MacLife, customize their devices. July, 2010, No. 42, 12-13. [10] Apple Computer Corp., Mac OS X has you covered, Rooting of Android OS or 'jail breaking' the Apple – Mac OS x – Security – Keeps safe from viruses and iPhone generally exploits applications' malware.pdf, http://www.apple.com/macosx/security vulnerabilities. These methods enable the users to [11] Keizer, G., Apple sneaks anti-malware update into Snow get 'super user' permission, allowing for full Leopard, ComputerWorld.com, June 18,2010, control of the kernel of the operating system. http://www.computerworld.com/s/article/9178227/Apple_sne While super user permission allows users to aks_anti_malware_update_into_Snow_Leopard?taxonomyId control many restricted functions of the =89 smartphone, this mighty authority can bring serious security threats when in the wrong hands. [12] Apple Computer Corp. The Application Runtime For instance, the attackers with super user Environment, iPhone Application Programming Guide, permission can delete the system to disable all March 24, 2010, p.23. functions of the smartphone, or install undeletable malicious applications. The possibility of [13] Apple Computer Corp. The Application Runtime distribution of kernel-attacking technology could Environment, iPhone Application Programming Guide, sharply increase as the number of mobile malware March 24, 2010, p.24. is increasing [26]. [14] InfoWorld Tech Watch, Hacker group: Apple iPad One recommendation that could go a long way in ‘simply not safe platform’, InfoWorld, http://www.infoworld.com/print/127154 heading off root exploits would be for manufacturers, including Apple, to support [15] Brent, Why You Should Jailbreak Your iPad, Simple Mobile Review, http://www.simplemobilereview.com/why- smartphone customization instead of fighting it. you-should-jailbreak-your-/ This way they could control the customization that some users insist on performing and not [16] Colenso, M., How to Jailbreak an iPhone, HowStuffWorks, http://electronics.howstuffworks.com/how- allow it to circumvent their security mechanisms. to-tech/how-to-jailbreak-iphone1.htm [17] Pytey [Member of the iPhone Dev Team], Email, June 24, 2010. REFERENCES [18] Security Dark Reading, iPads Susceptible To iPhone [1] Howe, C., The Mac OS X Malware Myth Continues, Malware, Researchers Say, Seeking Alpha, November 5, 2007, http://www.darkreading.com/security/vulnerabilities/showArt http://seekingalpha.com/article/52722-the-mac-os-x- icle.jhtml?articleID=225701444 malware-myth-continues [19] Finkle, J., Apple fixes security flaw in iPhone, iPad [2] Parrack, D., Mac OS X malware – What will the Apple software, Reuters. US edition, July 15, 2011, fanboys say?, Tech.Blog, June 2, 2010, http://www.reuters.com/article/2011/07/15/us-apple-security- http://tech.blorge.com/Structure:%20/2010/06/02/mac-os-x- idUSTRE76E5RN20110715 malware-what-will-the-apple-fanboys-say/ [20] Greenbaum, D., Antivirus Software on Your Mac: Yes or [3] Wauters, R., Apple Sells 2 Million iPads in 59 Days, No?, Gigaom, February 4, 2010, TechCrunch, may 31, 2010, http://gigaom.com/apple/antivirus-software-on-your-mac- http://techcrunch.com/2010/05/31/apple-sold-2-million- yes-or-no/ ipads-in-59-days/ [21] Kaneshige, T., iPhone and iPad security: 4 tips to stay [4] Costello, S., What Are the iPad Sales Figures All Time?, safe, IT World, July 23, 2011, About.Com, http://www.itworld.com/security/182123/iphone-and-ipad- http://ipod.about.com/od/ipadmodelsandterms/f/ipad-sales- security-4-tips-stay-safe to-date.htm [22] InfoSecurity Magazine, 5% of iPhones/Android handsets [5] Liebowitz, M., First Anti-Virus AppApproved for iPhone, to be infected in next 12 months, July 12, 2011, iPad, SecurityNewsDaily, July 12, 2011, http://www.infosecurity-magazine.com/view/19356/5-of- http://www.securitynewsdaily.com/new-anti-virus-app- iphonesandroid-handsets-to-be-infected-in-next-12-months/ removes-malware-from--ipad-0951/ [23] Keizer, G., Google pulls 22 more malicious Android [6] Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D., apps from Market, Computerworld, December 12, 2011, A Survey of Mobile malware in the Wild, Proceedings of the http://www.computerworld.com/s/article/9222595/Google_p ACM CCS Workshop on Security and Privacy in ulls_22_more_malicious_Android_apps_from_Market Smartphones and Mobile Devices, October 2011. [24] Russakovskii, A., Massive Security Vulnerability In [7] Lawton, G., Is it finally time to worry about mobile HTC Android Devices (EVO 3D, 4G, Thunderbolt, Others) malware?, Computer, May 2008. Exposes Phone Numbers, GPS, SMS, Emails Addresses, Much More, Android Police, October 5, 2011, [8] Danchev, D., Malware Watch: Free Mac OS X http://www.androidpolice.com/2011/10/01/massive-security- screensavers bundled with spyware, ZDNet, June 2, 2010, vulnerability-in-htc-android-devices-evo-3d-4g-thunderbolt-

978-1-4577-0580-9/12/$26.00 ©2012 IEEE others-exposes-phone-numbers-gps-sms-emails-addresses- much-more/ [25] Arora, N., Android Security Issues Could Score Windfall For Apple, Microsoft, Forbes Magazine, December 16, 2011, http://www.forbes.com/sites/greatspeculations/2011/12/16/an droid-security-issues-could-score-windfall-for-apple- microsoft/ [26] AhnLab, Inc., AhnLab Announces Mobile Security Threat Trends for 2012, January 11, 2012, http://www.prnewswire.co.uk/cgi/news/release?id=344690

JAILBREAKING WEBSITES Spririt—http://spiritjb.com I H8 Sn0w— http://ih8sn0w.com/index.php/welcome.snow QuickPWN— http://www.quickpwn.com/2009/10/jailbreak- iphone-3-1-2.html Redmond Pie— http://www.redmondpie.com/pwnagetool- 4.0-jailbreak-ios-4-iphone-3g-3gs/ Hackintosh— http://www.ihackintosh.com/2009/10/how-to- jailbreak-iphone-3gs-3-1-on-windows/ Appli iPhone Review— http://www.appleiphonereview.com/iphone-tutorials/how-to- jailbreak-unlock-iphone-2g-v-3-0/ BlogsDNA— http://www.blogsdna.com/3718/how-to- jailbreak-iphone-3g-30-with-quickpwn-on-windows-mac.htm iPhone Hacks— http://www.iphonehacks.com/2009/06/stepbystep-guide-to- jailbreak-iphone-3g-running-iphone-os-30-using-redsn0w- windows.html JailBreakMe.com— http://www.jailbreakme.com

978-1-4577-0580-9/12/$26.00 ©2012 IEEE