1. Apple, iOS Security, 2015, viewed 28 June 2016. https://www.apple.com/business/docs/iOS_Security_Guide.pdf.
2. M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, V. Shmatikov, The most dangerous code in the world: validating SSL certificates in non-browser software, in: Proceedings of the ACM Conference on Computer and Communications Security, 2012, pp. 38–49.
3. J. Byrnes, The San Bernardino iPhone case is over; the war has just begun, 29 March, AppAdvice, 2016, viewed 28 June 2016. http://appadvice.com/post/the-san-bernardino-iphone-case-is-over-the-war-has-just-begun/709112.
4. W. Clark, Uber’s App is Anything but Malware, 10 December, BETTER, 2014, viewed 28 June 2016. http://better.mobi/2014/12/10/ubers-app-is-anything-but-malware/.
5. An integrated conceptual digital forensic framework for cloud computing;Martini;Digit. Investig.,2012