8Carey Nachenberg. A Window Into Mobile Device Security[J]. Symantec Security Response, 2011:4-9.
9Miguel Helft, Kevin J.O' Brien. Inquiriew Grow Over Apple's Data Collection Practices[EB/OL].http://www.nytimes.com/2011/04/22/ technology/22data.html?_r=2&ref= global-home, 2011-04-21/2011-11 - 12.
10Jean. Analysis of the jailbreakme v3 font exploit[EB/OL], http://esec- lab.sogeti.com/ post/Analysis-of-the-jailbreakme-v3- font-exploit, 2011-07-18/2011-11-12.