Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices

http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf