At Black Hat USA this August don’t miss the new Mobile track of Briefings that’s full of cutting-edge insights into the unique weaknesses and strengths of Apple’s hardware.
Look, No Hands! — The Remote, Interaction-less Attack Surface of the iPhone explores the remote, interaction-less attack surface of iOS.
In this 50-minute Briefing a Google security engineer will discuss the potential for vulnerabilities in SMS, MMS, Visual Voicemail, iMessage and Mail, and explain how to set up tooling to test these components. You’ll also see two informative examples of vulnerabilities discovered using these methods.
You can also check out Attacking iPhone XS Max for expert insight into how Apple’s implementation of Pointer Authentication Code (PAC) on the A12 SoC comes more into play for exploit mitigations.
This talk will discuss Apple’s PAC implementation based on tests, introduce an ancient bug in the XNU that is still affecting the latest official release of iOS (i.e. 12.1.4), and elaborate on how to bypass PAC and gain arbitrary kernel read/write.
You’ll also learn about post exploitation techniques, including how to make arbitrary kernel function call based on arbitrary kernel read/write.
In All Your Apple are Belong to Us: Unique Identification and Cross-Device Tracking of Apple Devices security experts will show a study of Apple device unique identification and cross-device tracking technologies.
Experts will list several approaches (e.g., public APIs and vulnerabilities like CVE-2018-4322) to uniquely identify the Apple device even after a system rebooting or resetting.
They’ll also present advanced algorithms and vulnerabilities (e.g., CVE-2018-4321) to associate Apple device through deterministic user IDs (e.g., Apple IDs and phone numbers) and probabilistic data (e.g., device names, coordinate information, and IP addresses).
Last, but not least, you’ll discuss feasible solutions (e.g., instrumentation and differential privacy) to prevent unique identification and cross-device tracking.