Kristiina RahkemainSystem WeaknessUsing vulnerable libraries in iOS apps Part 1Walkthrough of exploiting an incorrect authorisation vulnerability in apps using the GCDWebServer library·7 min read·Jul 15, 2022----
Kristiina RahkemainITNEXTRisks of using third-party libraries in iOS appsHow high is the risk of introducing vulnerabilities to iOS apps through third-party libraries?·5 min read·Jul 13, 2022----
Kristiina RahkemainITNEXTAutoreleasepool and swiftMemory management in swift is handled with ARC (= automatic reference counting). This means that active references to objects are counted…·4 min read·Feb 5, 2022--2--2
Kristiina RahkemainDev GeniusSwiftDependencyChecker — check CocoaPods, Carthage and Swift PM dependencies for known…One source of vulnerabilities in our applications is the use of vulnerable versions of third party libraries. There are public…·6 min read·Jan 10, 2022--1--1
Kristiina RahkemainITNEXTTail recursion in swiftExample on what it is and how to avoid call stack overflows.·4 min read·Jul 19, 2021----
Kristiina RahkemaMost and least smelly open source iOS appsEmpirical analysis of code smells·3 min read·Sep 10, 2020----
Kristiina RahkemainDev GeniusAnalysis of open source iOS appsHow smelly is the code and what about testing?·4 min read·Jun 7, 2020--1--1
Kristiina RahkemainBetter ProgrammingWeak and unowned keywords in Swiftand why it is important to use them in closures— an example.·7 min read·Sep 16, 2019--1--1
Kristiina RahkemainThe StartupOWASP mobile top 10 security risks explained with real world examplesAs mobile application developers we should be familiar with possible security risks that a mobile application might face. Knowing possible…·7 min read·May 17, 2019----