Overview
Explore the risks of using third-party SDKs in mobile app development in this 24-minute conference talk from try! Swift NYC 2018. Discover how attackers can inject malicious code into bundled software and learn about the vulnerabilities in iOS SDKs. Delve into topics such as HTTP vs HTTPS, OSI layers, ARP poisoning, and popular SDKs like CocoaPods and Localytics. Gain insights on security requirements, realistic attack scenarios, and the implications of GDPR. Witness a live demo and understand the potential consequences of trusting external code in your app development process.
Syllabus
Introduction
iOS SDKs are vulnerable
How does it work
HTTP vs HTTPS
OSI Layers
ARP poisoning
CocoaPods
Localytics
Raspberry Pi
Amazon SDK
Change of topic
Requirements
Mac
Docs
Demo
How realistic is it
Most used SDKs
Reaction time
Other attack vectors
GDPR
Conclusion
Taught by
try! Swift Conference