Kristiina RahkemainSystem WeaknessUsing vulnerable libraries in iOS apps Part 1Walkthrough of exploiting an incorrect authorisation vulnerability in apps using the GCDWebServer libraryJul 15, 2022Jul 15, 2022
Kristiina RahkemainITNEXTRisks of using third-party libraries in iOS appsHow high is the risk of introducing vulnerabilities to iOS apps through third-party libraries?Jul 13, 2022Jul 13, 2022
Kristiina RahkemainITNEXTAutoreleasepool and swiftMemory management in swift is handled with ARC (= automatic reference counting). This means that active references to objects are counted…Feb 5, 20222Feb 5, 20222
Kristiina RahkemainDev GeniusSwiftDependencyChecker — check CocoaPods, Carthage and Swift PM dependencies for known…One source of vulnerabilities in our applications is the use of vulnerable versions of third party libraries. There are public…Jan 10, 20221Jan 10, 20221
Kristiina RahkemainITNEXTTail recursion in swiftExample on what it is and how to avoid call stack overflows.Jul 19, 2021Jul 19, 2021
Kristiina RahkemaMost and least smelly open source iOS appsEmpirical analysis of code smellsSep 10, 2020Sep 10, 2020
Kristiina RahkemainDev GeniusAnalysis of open source iOS appsHow smelly is the code and what about testing?Jun 7, 20201Jun 7, 20201
Kristiina RahkemainBetter ProgrammingWeak and unowned keywords in Swiftand why it is important to use them in closures— an example.Sep 16, 20191Sep 16, 20191
Kristiina RahkemainThe StartupOWASP mobile top 10 security risks explained with real world examplesAs mobile application developers we should be familiar with possible security risks that a mobile application might face. Knowing possible…May 17, 2019May 17, 2019