1. SANS institute;Johnson;Mob. Appl. Secur. Surv.,2013
2. ARXAN (2013), Threats to Mobile Apps in the Wild. https://www.arxan.com/wp-content/uploads/2015/01/Threats_to_Mobile_Apps_in_the_Wild_v0.3.pdf (accessed 17.07.15).
3. Identifying back doors, attack points, and surveillance mechanisms in iOS devices;Zdziarski;Digit. Investig.,2014
4. HP (2013), HP Research Reveals Nine out of 10 Mobile Applications Vulnerable to Attack, http://www8.hp.com/us/en/hp-news/press-release.html?id=1528865 (accessed 17.07.15).
5. Apple (2015), iOS Security, https://www.apple.com/business/docs/iOS_Security_Guide.pdf (accessed 17.07.15).