papers.put.as

A collection of papers and presentation slides related to Mac OS X, iOS, and Firmware.

iOS

2010 2011 2012 2013 2014 2015 2016

2008

Primer on Reversing Jailbroken iPhone Native Applications

by Shub-Nigurrath
at N/A
type paper
hash d7ce8143584bdc93fe94df4b77a6cf7a46074818c0ad077ed05e9dd961aff535

top

2009

Fun and Games with Mac OS X and iPhone Payloads

by Charlie Miller & Vicenzo Iozzo
at BlackHat EU
type paper
hash 23de2ace1a58167d432ee218aa265f02c906a6e114cdc9e930285e41fb6a194c

Patching Applications from Apple AppStore with additional protection

by Reilly
at N/A
type paper
hash e77a8fa323e87e69fb7221fa8aa6d83f6f721f26ef50399e64cc30a7bbc7a1be

top

2010

iPhone Rootkit? There’s an App for that!

by Eric Monti
at ToorCon
type slides
hash 4356ad24434c5ea601ddcf22e56746f1c48dee6cc44aa002716ae75c95d92f2d

iPhone security model & vulnerabilities

by Cedric Halbronn & Jean Sigwald
at HITB
type slides
hash b9946b4d2cea38a83fe146f63b555c67bd67c8cbda3d79e750c9e9d72122e17e

iPhone Privacy

by Nicolas Seriot
at BlackHat DC
type paper
hash 439d1103ebafb7fe25332f446e4f371c5d9cffb52d1b164284dd666c5f9b9381

Adding ASLR to jailbroken iPhones

by Stefan Esser
at POC
type slides
hash 7829c8888f6477ec8cd63ce3bd2df8338bc39ba21a41276f6b3e6aaf90bba790

Penetration Testing for iPhone/iPad Applications

by Kunjan Shah
at N/A
type paper
hash 10e6109b26255ce70b73694163589b57d3f12d6d4f02901224ea342d942bd590

top

2011

iNception – Planting and Extracting Sensitive Data From Your iPhone’s Subconscious

by Laurent Oudot
at HITB Amsterdam
type slides
hash 0ef1fad7eeb90a1e1bea56ed915f8cd369f0b887fdb04b45afbf44c38094f6c1

iPhone Data Protection in Depth

by Jean-Baptiste Bédrune & Jean Sigwald
at N/A
type slides
hash 640548b65b0cd5d646d5c2f2bc06e81f51dd128c75aee031957066efb8963a58

Auditing iPhone and iPad applications

by Ilja van Sprundel
at N/A
type slides
hash 477061ecc010f7925114436c52ea285d930a03f2b8e66e941c8891819f1a80d4

Practical Consideration of iOS Device Encryption Security

by Jens Heider & Matthias Boll
at N/A
type slides
hash 0cbb3b679c99b0cd0673f069c71c44eb50928dd00153b8dc7c3f4a8cd1752a65

Apple iOS 4 Security Evaluation

by Dino Dai Zovi
at BlackHat
type slides
hash af73d6693fef42def66d937eadf2415c3ddab7308233603436b5b63f276bc0f7

Apple iOS 4 Security Evaluation

by Dino Dai Zovi
at BlackHat
type paper
hash 22bc28db103b4ee506643bbefff14be65c57ddf9a6ae27e7199a3f08ec9b9c62

OVERCOMING iOS DATA PROTECTION TO RE-ENABLE iPHONE FORENSICS

by Andrey Belenko
at BlackHat
type slides
hash e9c69669cee609d66d56a2ec2fc048a74c43a63f7b8ced9441c303d1033afa61

OVERCOMING iOS DATA PROTECTION TO RE-ENABLE iPHONE FORENSICS

by Andrey Belenko
at BlackHat
type paper
hash 1066634e396a99cc56d0fd93c28cbb578ddf56a78e23d09152e1d0d03870b347

Exploiting the iOS Kernel

by Stefan Esser
at BlackHat
type slides
hash dc0e6df422dc6bf7b0866c9a592dded49dcc8ca8c19f4421429e39577215a274

Exploiting the iOS Kernel

by Stefan Esser
at BlackHat
type paper
hash 62a43041d18d4905ada5199f7a8597e0e26ce1b5382cc197e6bd446b8a4a8ac4

iPhone Exploitation – One ROPe to Bind Them All?

by Stefan Esser
at HITB
type slides
hash 27e44c4a651c9753815d6a5911faad5503085448b8acca9dc7ca34d918b75f26

iPhone Espionage

by Keith Lee
at SIGINT
type slides
hash 5aa4e7ea29abc43c573867bb0e8efaf502b5d7ceb951e5e63769c23af3ebdb0b

Antid0te 2.0 – ASLR in iOS

by Stefan Esser
at HITB Amsterdam
type slides
hash f67332158701024c6e09773917b08a4be6ef31cb12febb5c93eab88de826ca3b

Targeting The IOS Kernel

by Stefan Esser
at SyScan Singapore
type slides
hash 9bcccb54c11e0cc0a2760a040761fda1a832a6859cef1f4284c4fe34a7ac8254

Baseband Playground

by Luis Miras
at Ekoparty
type slides
hash 53f04e7ee9a754048925e8bd88e9018df509378805d98706798ba2b81de4b451

Dont Hassle the Hoff : Breaking iOS code signing

by Charlie Miller
at SyScan Taipei
type slides
hash 6c00735b0ca239961159898dde5fb34e0c3a4a6f31299c178d9bf3971dbdceb9

iOS Kernel Exploitation, IOKit Edition

by Stefan Esser
at SyScan Taipei
type slides
hash bb219e0738ef45bbc32c3d2c150b08374e1814d10a5de2f1df8366d89d892842

Secure Development on iOS

by David Thiel
at PacSec
type slides
hash 36e8728ba8b54747ee7266326bca9b7faf8337d9c1044b014cbf52b2c48dfed1

An analysis on iOS Jailbreak

by Huang Heqing
at N/A
type paper
hash f5d05e57390742e6adf392c29979a4f5649d27a0870f99de16e4df3e718c0a65

An analysis on iOS Jailbreak

by Huang Heqing
at N/A
type slides
hash 240943253bc355dcc50fe0b960cad2baae68d5ca5a17b7495b773c8048a7a166

Evolution of iOS Data Protection and iPhone Forensics: from iPhone OS to iOS 5

by Andrey Belenko & Dmitry Sklyarov
at BlackHat Abu Dhabi
type slides
hash aff2a924f97e26e96de8983d9e66cf77668bbf03d9c1931f23fcd39ccf4dc0bf

iOS applications reverse engineering

by Julien Bachmann
at SCS
type slides
hash 2e114994ce9f47938441c5fc3c1fbfb59ea045dfe6e9ba484be1d7969c61a785

Apple iPad In the Work Place

by Russ Spooner
at N/A
type paper
hash 2fb5854499fe79eb23aa158b159d2436c11cb67f5adf2372588353dbbffed11d

Attacking and Defending Apple iOS Devices in the Enterprise

by Tom Eston
at N/A
type slides
hash 25fca5e96d43119648650834fed9cbca25d2d8d5352b64d1d59bef640b093aa9

Writing secure iOS applications

by Ilja van Sprundel
at N/A
type slides
hash be005ec68a961e3f3f48a96351913eb673f592c863afd62611d467c663f2e1e3

Rootkit for iPhone & Way To Launch Real attack

by Xu Hao & Chen Xiaobo
at POC
type slides
hash 0fa51bda51502157b57000d6668687f0eeaed39168d1e302fa470b17b39a00c3

Inside Apple’s MDM Black Box

by David Schuetz
at BlackHat
type slides
hash ad319225f8202c79af499abe67fe021dddcf8a41b21dfad6323ccaa890a3bcae

Inside Apple’s MDM Black Box

by David Schuetz
at BlackHat
type paper
hash 477e84304dce45f2677b9f195351ef28f3dae5796757eb44632ba48c5c700fb4

Pentesting iPhone Applications

by Satishb3
at c0c0n
type slides
hash 7671a0ead116c803d10f617376f146931882160836e803fa500af47671d3b322

Pentesting iPhone & iPad Apps

by Flora Bottaccio and Sebastien Andrivet
at Hack In Paris
type slides
hash 616f17ab32783b16c2e2661c92b7a0754612d209dd80b4f4bd84a0060a524b1f

NEW AGE APPLICATION ATTACKS AGAINST APPLE’s iOS [AND COUNTERMEASURES]

by Nitesh Dhanjani
at BlackHat Barcelona
type paper
hash 4fbe961ff5cc9b454774943915f625a3049e48d66b3c8940038bb558a8af8b54

Hacking and Securing Next Generation iPhone and iPad Apps

by Nitesh Dhanjani and Sean Pennline
at Sans AppSec Summit
type slides
hash c8beef0e2b2fd2fe908ade963eb2040b7645b072210380c78e7a9aec0f87248b

Attacking iPhone & iPad applications

by Sebastien Andrivet
at Soft-Shake
type slides
hash f8e9d40c5a17fb640fd72f2696e1612bf4f1eb761af38f30da6ac326fd7192e2

Handling iOS encryption in a forensic investigation

by Jochem van Kerkwijk
at N/A
type paper
hash 2fe5ca419276ef4c37dc36ab482d6ba44facb091aa882b3fb3756467d3e7f089

iOS Forensics: Overcoming iPhone Data Protection

by Andrey Belenko
at N/A
type slides
hash ff7a5edaf6a50a5c9908ab235da51628cb0629c4bb9296607cc76ab7e2a5a3e4

IPhone backup files. A penetration tester’s treasure trove?

by Darren Manners
at N/A
type paper
hash 6f835561737dbbffcfbcd5bbb2fd6118e36171703bbaafc7a6e8854be14c3d53

iPhone Forensics with F/OSS

by ViaForensics
at N/A
type slides
hash 005c39b9b5ce08110a845e3550eb51928fd3e8f3041325c62c0f8f8e6aac295b

top

2012

iOS5 An Exploitation Nightmare?

by Stefan Esser
at CanSecWest
type slides
hash 66a4d3c1e05d26915d8b3f8d4f79419a407a14c4761614cf1ba1fdebba55205f

iOS Application (In)Security

by Dominic Chell
at OWASP Ireland
type slides
hash b2e1126062a3ccabbc879743bd554e1096aea808bcededc4a2774946c6732ddb

iOS Application (In)Security

by MDSec
at N/A
type paper
hash 6d21745d30cb02ac889da76d17685954fb44b4db38c8b82d9043b616e62de299

iOS Applications – Different Developers Same Mistakes

by Paul Craig
at SyScan Singapore
type slides
hash 584e3f9234dba2b7dc6130a3fc3cb8cbdd45af7e57d66f8e3636d53330393c2c

iOS Kernel Heap Armageddon

by Stefan Esser
at SyScan Singapore
type slides
hash 6fd27d6ac2697b9746cb5619954a5721d51434cb68832907d4bd34b3c7014408

Evaluating iOS Applications

by MDSec
at OWASP Manchester
type slides
hash 6f866d4510885f551651817512a411a6ead47286a429e6d29c153bbbaab382f5

Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really?

by Andrey Belenko & Dmitry Sklyarov
at BlackHat EU
type slides
hash ae81e9e5817eac31baec34c237016bde803181d7b102ce95ffc765f3e702ab50

Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really?

by Andrey Belenko & Dmitry Sklyarov
at BlackHat EU
type paper
hash a8c9aadc375942f9cf500b594d2873c51ab3286578773a349c0ea94f47331987

Corona Jailbreak for iOS 5.0

by Jailbreak Dream Team
at HITB Amsterdam
type slides
hash c669af2acd898f4c65c0d00e1da77e7fe88c6bba981a60c24ce6ebe8fc9748c1

Corona Jailbreak for iOS 5.0.1

by Jailbreak Dream Team
at HITB Amsterdam
type slides
hash 82c50f86af398eb7ee24e497a909fc7439f2072b086611f227e143ecab472e3f

Absinthe Jailbreak for iOS 5.0.1

by Jailbreak Dream Team
at HITB Amsterdam
type slides
hash cb6804579f18ef96b10fe9b4cfb99048061dc7c3dd22266489e90f5baa3dc01c

iOS 6 Security: A Hacker’s Guide

by Mark Dowd & Tarjei Mandt
at HITB
type slides
hash ff4025631bceaa26fdbce51877b7dd4f7d290698fce6d500f7d4d190d48c45af

Find Your Own iOS Kernel Bug

by Xu Hao & Xiabo Che
at POC
type slides
hash 3cbc098e63bb7ca4f737e39bb0806015f9be7ae418cf51dae6ebabe063223801

Practical iOS Apps hacking

by Mathieu Renard
at GreHack
type paper
hash c0203b18a05e3d0748943c5aedd3037782f1ae400a5d68816878e12d443af660

Defending Data on iOS

by Securosis, LLC
at N/A
type paper
hash 623bc397d29312470083649804c4400b497e4ea401d5be8b98ae7162e124b270

Jailbreaking Techniques

by pod2g
at WWJC
type slides
hash 3c8e9374d43b6f7d77c2234d287796257e564be8bb45e379019ead16a746ca90

Downgrading iOS: SHSH Blobs & APTickets

by iH8sn0w
at WWJC
type slides
hash 5cd2540bf620edf05ab55873bf4c3550ddba38c8afc34774b7bb912ee65a589b

A Close-Up on Jailbreaking and Tweak Development

by Nokias Bassen
at WWJC
type slides
hash 305e9665f090a171bd1acbbb056b22eddf2cf75dc8293a4351c15550819963ff

iOS applications auditing

by Julien Bachmann
at AppSec Forum
type slides
hash 50218eea557b686604f8405933af7f3bab51f9504bbbc7b76755eeb2d0f7fa40

Pentesting iOS Apps: Runtime Analysis and Manipulation

by Andreas Kurtz
at DeepSec
type slides
hash 6304f4b30a71fab2a871daa1927e97f2d1cbd61a7cd1d26ead7fff38de23fbd8

Practical iOS Apps hacking

by Mathieu Renard
at GreHack
type slides
hash 63aa0682a66785f687a445749a35b04d630815e3624a1cd8b60d95e8e3f4250d

Hacking iOS Applications

by Mathieu Renard
at Hack.lu
type slides
hash a6a16a764e460f71f1f7440b664bc89d18636a9b509aee07e0dd1fce255cbe6d

top

2013

Attacking the iOS Kernel: A Look at ‘evasi0n’

by Tarjei Mandt
at NIS
type slides
hash 0ba33dc64a9eb41bc16a7a9e48636dc7486b9d56de26d24c3d871f553288c8e7

Swiping Through Modern Security Features

by evad3rs
at HITB Amsterdam
type slides
hash 8a506929f49af48b4a19ae855a6b7d83536fcb4a56f0e6da9f1fa1618ac8a322

Blackbox analysis of iOS apps

by Dmitry Evdokimov
at ZeroNights
type slides
hash fe7523c0de6118a046b78e64437cf59a19e789229d6e3ec7094fbe24499fcfce

How to assess and secure iOS apps

by NCC Group
at 44Con
type slides
hash 704c6c12193d6b95220f6242a413ff46decb69a47deb235da31ce0a9f91cea2a

Tales from iOS 6 Exploitation and iOS 7 Security Changes

by Stefan Esser
at SyScan360 Beijing
type slides
hash aa554066fa178aac334abe8b741d609dc4e01c6690caffe290042f7505a6ad05

Tales from iOS 6 Exploitation and iOS 7 Security Changes

by Stefan Esser
at HITB
type slides
hash 35742e71ba721d5d04ad92336581bae0e32518d6edc5e96e98fdb06af79f807f

iMessage Privacy

by pod2g & gg
at HITB
type slides
hash 1d393756fa8bae533391b4947fd4491f3e2b080d883670e861fd3504ee9ebdda

SHAttered Dreams - Adventures in BootROM Land

by posixninja
at HITB
type slides
hash b52768a617c5e60708b630469b63aabb50368358f79036040bf797dd8d48ffd6

Modern smartphone forensics

by Vladimir Katalov
at HITB
type slides
hash ba803dfdf1fa1ff08044023da4d9195edf00dbdf4aaf953ad472d39c4ce1f805

fuzzyDuck.sh - iOS Fuzzin Wrapper Script

by isa56k
at N/A
type slides
hash 00156f830b9161e2fbe51a9cb17caff77012a456b8d90b87f4b4ffbd86017cbd

Usability vs. Security: The Everlasting Trade-Off in the Context of Apple iOS Mobile Hotspots

by Andreas Kurtz, Felix Freiling, Daniel Metz
at N/A
type paper
hash e3ad95387610b5a1c43bbcf6ce716cc85296bf87179212b9efdbe8af82ff1e4d

Introspy - Security Profiling for Blackbox iOS and Android

by Marc Blanchou & Alban Diquet
at Ruxcon
type slides
hash 182a86d4137c96ceb56f85e4a1f66add5d554138d25872617f9edd6dc40150c2

iOS 6 exploitation 280 days later

by Stefan Esser
at CanSecWest
type slides
hash ec225390c392039c58bb87a1e36d04285c18a7a0535634e47c66ea2f4ebd93bc

Mactans: Injecting Malware into iOS Devices via Malicious Chargers

by Billy Lau, Yeongjin Jang, Chengyu Song
at BlackHat
type slides
hash 66755c8b04c162099b9947e6f82fddce2689f25c389d47d57329bf3a6f68f614

Mactans: Injecting Malware into iOS Devices via Malicious Chargers

by Billy Lau, Yeongjin Jang, Chengyu Song
at BlackHat
type paper
hash 6a007d916025970e318c3f4f3d5ae1fe6e2809fbf6d7e8438db02e10f21a043d

Penetration Testing for iOS Applications

by ShadowLabs
at OWASP
type slides
hash 8988e79c5f33c3fcfe72871a05142adb2caa609d22f6e00bc2d55abdc91d50b7

Hacking apple accessories to pown iDevices - Wake up Neo! Your phone got pown!

by Mathieu Renard
at HES
type slides
hash f4c1a43a92e8495b2faabba22660448e8b2985a60a752f84bdebedca37333edb

iOS Debugging

by Dawid Planeta
at N/A
type slides
hash 98208ecd0334e8a25a4136c10b954284a0990e549481dd2cdf70a4746b2f392c

Advanced iOS Application Pentesting

by Vivek Ramachandran
at BlackHat EU
type slides
hash e441c1687c8beab8e0bc415e305ce17f0637d5ab3efe92ff0786bea14312cbc4

top

2014

Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices

by Jonathan Zdziarski
at HOPE/X
type slides
hash b916f6cb20392c9b3e93fcf6a47a142131775f674326c162a033deaf34c10490

Reversing iOS Apps – a practical approach

by Patrick Wardle
at T2
type slides
hash 53ae76a1df0f2bf7047f67cb744c40aed55748dbe83c595f663ac502bb5baa25

Exploiting Unpatched iOS Vulnerabilities for Fun and Profit

by Various Authors
at N/A
type slides
hash 14936b2b2984266b5c4db1bb32674842c5d5d9db6b1feed783a82e562c766ea2

idb – iOS Blackbox Pentesting

by Daniel A. Mayer
at ShmooCon
type slides
hash 25058c3e40c551f71e7b05191ad6d3a3d9492c281a330eb2143f78d1c8fd794e

Exploring and Exploiting
iOS Web Browsers

by Lukasz Pilorz, Marek Zmyslowski
at HITB Amsterdam
type slides
hash 4b7762a65025810a60c847816024b5bc9440a12362368aa4c190ead1fa39ae69

Revisiting iOS Kernel (In)Security: Attacking the Early Random PRNG

by Tarjei Mandt
at CanSecWest
type slides
hash 52ccd025f06783af08907b4f852980c01d4cabbf0dbeb466fa60beb513a722c7

Revisiting iOS Kernel (In)Security: Attacking the Early Random PRNG

by Tarjei Mandt
at CanSecWest
type paper
hash 015d1fd64701018f47c47ce3f75ec116547f2b46a7ae4b2480a3275ba0a53305

DiOS: Dynamic Privacy Analysis of iOS Applications

by Andreas Kurtz, Andreas Weinlein, Christoph Settgast, Felix Freiling
at N/A
type paper
hash 27fde8cb97465ce7fa75c29bb1dd8b57d3ef33f521c63467d40319e4d6a65dcb

iOS Apps reversing - a practical approach

by Patrick Wardle
at Source Boston
type slides
hash 83c5f814621387a1c21ea83510149c64f371cd4c201becd3872737d4b4cbb63e

top

2015

iOS 678 Security
– Study in Fail

by Stefan Esser
at SyScan Singapore
type slides
hash e9c162fbb42e12fa129859a4c22e60cb0784fab1f14fcc46a2c91cf0ec633271

Optimized Fuzzing IOKIT in iOS

by Lei Long
at BlackHat
type slides
hash f0611e88d889f45c925da4d42dd096f91867593258c60b39095f8cef6204f6e3

Optimized Fuzzing IOKIT in iOS

by Lei Long
at Blackhat
type paper
hash 10f0ebc7b0c3d5dd1d6046570486b14a830b3ad961fd2aa86b973a2f544f4a40

Review and Exploit Neglected Attack Surface in iOS 8

by Pangu Team
at BlackHat
type slides
hash f577e46b7e7319c37393a6fca53fd27c17df0504c347016aed7615016264dfea

Hacking from iOS 8 to iOS 9

by Pangu Team
at Ruxcon/POC
type slides
hash 30979183c0dcc105a4349b1ec46bb91d32b8b9896b7359e7559ac1dd71d763fb

top

2016

Giving Mobile Security the Boot

by Jonathan Levin
at N/A
type slides
hash c68497617c276e102ec1fe992920787364afdab1393ede84db1f4533d2fd0701

Fruit vs Zombies: Defeat Non-jailbroken iOS Malware

by Claud Xiao
at Shakacon
type slides
hash d3efd7c969a4607699e96dd6da1eca0ef223eb92c7f2581005cf7c75c41948e7

Demystifying the Secure Enclave Processor

by Tarjei Mandt, Mathew Solnik, David Wang
at BlackHat
type slides
hash 880fc21b4549b9ad417b1bbb8b0c29bd86c472d13a7f924c8641b2a13a585d4d

Pangu 9 Internals

by Tielei Wang, Hao Xu, Xiaobo Chen
at BlackHat
type slides
hash f2d712305d1993de7ff312a6639c68874db5d259349b3f048ff14212f0370fe7

Pangu 9 Internals (BH site version)

by Tielei Wang, Hao Xu, Xiaobo Chen
at BlackHat
type slides
hash 1cf6b4473687270946e65cf268f4ac7db9e4132e17bc59a443fcc634564fe9b2

Behinde the Scenes with iOS Security

by Ivan Krstic
at BlackHat
type slides
hash 417434fbd677df115cde90dbdc86328dea796162fe62d08fbb89ef65df094cce

iOS 10 - Kernel Heap Revisited

by Stefan Esser
at HITB GSEC
type slides
hash 3828483488f036c31b91b25c991b10cb1d539684bba4bb4fdc2a6e2016224d60

top