2023-10-20
Reverse Engineering
- OpoSec Set 2019 - Hacking Your Cable Modem (2017)
- OpoSec Out 2019 - Reverse Engineering Your Cable Modem (2017)
2020-11-24
macOS
- An Attacker’s Perspective On Jamf Configurations (2020)
- Walking the Bifrost - An Operator’s Guide to Heimdal & Kerberos on macOS (2020)
- Binary Emulation for Threat Analysis with Binee (2020)
- Grafting Apple Tree’s Building a useful process tree (2020)
- Finding Waldo In The Apple Unified Log (2020)
- Job(s) Bless Us! Privileged Operations on macOS (2020)
- Mimic in Configuration (2020)
- Exploring macOS with APOLLO (2020)
- Endpoint Security and Insecurity (2020)
- The case of the fly on the wall …and the legal issues of disclosing malware (2020)
- Quarantine nights Exploring File Quarantine handling in macOS Apps (2020)
- Abusing & Securing XPC in macOS apps (2020)
- Documents of Doom - infecting macOS via office macros (2020)
iOS
- KTRW - The journey to build a debuggable iPhone (2020)
- iMessage Exploitation Remotely Compromising an iPhone over iMessage (2020)
- tvOS-Checkra1n (2020)
2020-05-26
macOS
- ModJack - Hijacking the macOS Kernel (2019)
- Adventures on hunting for Safari Sandbox Escapes (2020)
- Repurposed Malware - A Dark Side of Recycling (2020)
Firmware
- IOMMU and DMA attacks (2019)
2020-01-12
Firmware
- Bypassing a Hardware-Based Trusted Boot Through x86 CPU Microcode Downgrade (2019)
- Betrayal of Reputation: Trusting the Untrustable Hardware and Software with Reputation (2019)
Fuzzing
- Advanced Mutation Fuzzing Method For Wireless Protocols (2019)
- Creating a fuzzer for telecom protocol - 4G LTE case study (2019)
- Launching feedback-driven fuzzing on TrustZone TEE (2019)
Malware
- ADWIND — A CROSS-PLATFORM RAT (2016)
- OSX Pirrit: What adware that “just” displays ads means for Mac OS X security (2016)
- OSX Pirrit: Part III - The DaVinci Code (2017)
- What Species of this Fish is? Malware Classification with Graph Hash (2019)
- Tick Tock – Activities of the Tick Group in East Asia (2019)
- Trails of Windshift (2019)
Machine Learning
VulnDev
2019-12-13
macOS
- Safari Adventure: A Dive Into Appple Browser Internals (2019)
- Incident Response on macOS (2019)
- 0DAYZ OF OUR LIFE (2019)
- Fun with Mac Malware Attribution (2019)
- How to reverse malware on macOS without getting infected (2019)
iOS
- The One Weird Trick SecureROM Hates (2019)
- Exploiting IOSurface 0 (2019)
- Simplifying iOS Research: Booting the iOS Kernel to an Interactive Bash Shell on QEMU (2019)
- Running iOS in QEMU to an interactive bash shell (1): tutorial (2019)
Malware
- WIRELURKER: A New Era in iOS and OS X Malware (2015)
- Inside Hidden Cobra Cyber Offensive Programs (2019)
Machine Learning
- Learning to Detect and Classify Malicious Executables in the Wild (2006)
- Building a Machine Learning Classifier for Malware Detection (2014)
- Automatic classification of object code using machine learning (2015)
- Automatic classification of object code using machine learning (2015)
- Applied Machine Learning & Data Science for Cybersecurity (2018)
- Binary Similarity Detection Using Machine Learning (2018)
- ALFRED, FIND THE ATTACKER - A primer on AI & ML applications in the IT Security Domain (2019)
- Machine Learning Implementation Security in the Wild (2019)
- Checking Defects in Deep Learning AI Models (2019)
VulnDev
- Attacking Hyper-V (2019)
Reverse Engineering
- Automation Techniques in C++ Reverse Engineering (2019)
- BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation (2019)
2019-10-25
macOS
iOS
Firmware
- Getting into the SMRAM: SMM Reloaded (2009)
- Following the White Rabbit: Software attacks against Intel VT-d technology (2011)
- Rootkit in your laptop: Hidden code in your chipset and how to discover what exactly it does (2012)
- BIOS Chronomancy: Fixing the Core Root of Trust for Measurement (2013)
- You Can Type, but You Can’t Hide: A Stealthy GPU-based Keylogger (2013)
- Building A UEFI Security Test Strategy (2014)
- Intel ME: Two Years Later (2014)
- Intel ME: Two Years Later (less slides) (2014)
- Intel ME Secrets: Hidden code in your chipset and how to discover what exactly it does (2014)
- Attacking and Defending BIOS in 2015 (2015)
- Attacking Hypervisors via Firmware and Hardware (2015)
- How Many Million BIOSes Would you Like to infect? (2015)
- UEFI Firmware – Securing SMM (2015)
Malware
- Robust Static Analysis of Portable Executable Malware (2014)
- CARBANAK APT THE GREAT BANK ROBBERY (2015)
- The DUQU 2.0 (2015)
2019-10-19
macOS
- Analysis & Correlation of Mac Logs (2012)
- Mac Memory Analysis with Volatility (2012)
- When Macs get hacked (2012)
- Reverse Engineering Mac Malware (2014)
- Signed, Sealed and Delivered (2017)
- Bits of launchd (2018)
- mac_apt - macOS Artifact Parsing Tool (2018)
- Hypervisor-based Analysis of macOS Malware (2019)
- Zero To RCE In Two Days - Exploiting Zoom on macOS (2019)
- Shedding Light on the macOS Spotlight Desktop Search Service (2019)
- .DS_Stores: Like Shellbags but for Macs (2019)
iOS
- iPhone Processing (2008)
- iOS Forensics (2011)
- Acquisition and Analysis of iOS Devices (2013)
- iOS FORENSICS: WHERE ARE WE NOW AND WHAT ARE WE MISSING? (2016)
- The iOS of Sauron: How iOS Tracks Everything You Do (2016)
- The incident response playbook: For Android and iOS (2016)
- Automated Evaluation of Access Control in the iPhone Operating System (2018)
- iOS War Stories (2018)
- A Forensic Exploration of iOS Health Data (2018)
- Totally Not Spyware: Jailbreaking from the Browser (2019)
- voucher_swap (2019)
- Recreating an iOS 0-day jailbreak out of Apple’s security patches (2019)
- A few JSC tales (2019)
- Forensics of iOS CarPlay and Android Auto (2019)
- Evolution of iOS mitigations (2019)
Malware
2019-08-28
macOS
2019-08-26
macOS
- Crashing to root: How to bypass SIP on macOS (2018)
- MACDOORED - A FIRST LOOK INTO REAL-WORLD MACOS INTRUSIONS (2018)
- When Macs Come Under ATT&CK (2018)
- FROM APPLE SEEDS TO APPLE PIE (2018)
- APFS - No clever or witty subtitle. (2018)
- Aliens Among Us (2018)
- What’s Your Game Plan? Leveraging Apple’s Game Engine to Detect macOS Threats (2018)
- Code signing flaw in macOS (2018)
- Who moved my pixels?! (2018)
- Protecting the Garden of Eden (2018)
- IOService Becomes a Grandpa (2018)
- Drill the Apple Core: Up & Down - Fuzzing Apple Core component in Kernel and User Mode for Fun and Profit (2018)
- Harnessing Weapons of Mac Destruction (2019)
- Unpacking .pkgs - A look inside macOS Installer packages and common security flaws (2019)
- How to gain root with CVE-2018-4193 in < 10s (2019)
- Debug for bug: Crack and Hack Apple Core by itself (2019)
iOS
- The last line of defense: understanding and attacking Apple File System on iOS (2018)
- Eternal War in XNU Kernel Objects (2018)
- The hidden gems of iOS (2019)
- Life as an iOS Attacker (2019)
- Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime (2019)
- Look, No Hands! The Remote, Interaction-less Attack Surface of the iPhone (2019)
- Attacking iPhone XS Max (2019)
- All Your Apple Are Belong To Us: Unique Identification and Cross-device Tracking of Apple Devices (2019)
- Seeing Inside The Encrypted Envelope (2019)
- WEN ETA JB? A 2 million dollars problem (2019)
- WEN ETA JB? A 2 million dollars problem (2019)
Firmware
- BETRAYING THE BIOS: WHERE THE GUARDIANS OF THE BIOS ARE FAILING (2017)
- Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller (2019)
- Inside the Apple T2 (2019)
- Behind the Scenes of Intel Security and Manageability Engine (2019)
Fuzzing
Malware
- THE ‘ICEFOG’ APT: A TALE OF CLOAK AND THREE DAGGERS (2013)
- .NET MALWARE THREAT: INTERNALS AND REVERSING (2019)