mac osx逆向工程

Mac OS X

YEARNAMEAUTHOR(S)CONFERENCE
2003      
  Dynamically Overriding Mac OS X Jonathan Rentzsch N/A
  A Debugger with Gui in OS X Ivan Krizsan N/A
2004      
  Practical Mac OS X Insecurity Angelo Laub CCC
2005      
  MacOS Kernel Insecurity Ilja van Sprundel &
Christian Klein
N/A
  Infecting the Mach-O Object Format Nemo N/A
  Hacking Mac OS X Kernel for unsupported machines Ryan Rempel N/A
  FireWire: All your memory are belong to us Michael Becher &
Maximillian Dornseif & Christian N. Klein
Cansecwest
2006      
  Breaking Mac OS X Nemo, Ilja van Sprundel N/A
  Abusing Mach on Mac OS X Nemo N/A
  Hit by a Bus: Physical Access Attacks with Firewire Adam Boileau Ruxcon
  Hardware Virtualization Rootkits Dino Dai Zovi BlackHat
  Discovering Mac OS X Weaknesses Jay Beale Def Con 14
2007      
  Hacking Leopard Charlie Miller &
Jake Honoroff
N/A
  Inside the Mac OS X Kernel Lucy 24C3 2007
2008      
  Hacking OS X Charlie Miller BH Japan 08
  Dtrace The Reverse Engineer’s Unexpected Swiss Army Knife Tiller Beauchamp &
David Weston
BH US 08
  iRK – Crafting OS X Kernel Rootkits Jesse D’Aguanno BH US 08
  RETrace – Applied Reverse Engineering on OS X Tiller Beauchamp &
David Weston
Defcon 16
  Under the iHood Cameron Hotchkies Recon 2008
  Covering the tracks on Mac OS X Leopard Charles Scott N/A
  OS X Rootkits – the next level Alfredo Pesoli LaCon 2008
  How the Leopard hides his spots The Gruqq HITB KL
2009      
  Advanced Mac OSX Rootkits (paper) Dino Dai Zovi N/A
  Advanced Mac OS X Rootkits Dino Dai Zovi N/A
  Runtime Kernel Patching on OS X Bosse Eriksson Defcon 17
  Mac OS Xploitation Dino Dai Zovi N/A
  Dynamic Tracing for Exploitation and Fuzzing Tiller Beauchamp &
David Weston
Shakacon 2009
  Mac OS X Malware Analysis Joel Yonts N/A
  Objective-c Internals André Pang N/A
  Hacking Macs for Fun and Profit Dino Dai Zovi &
Charlie Miller
CSW 2009
  Mac OS Xploitation Dino Dai Zovi Source 2009
  Debugging Cocoa with DTrace Colin Wheeler N/A
  Let your Mach-O fly Vincenzo Iozzo BH DC 09
  Dynamically Overriding Mac OS X – Down the Rabbit Hole Jonathan Rentzsch N/A
  Encryption Wrapper on OSX.pdf Unknown N/A
2010      
  Function hooking for OSX and Linux Joe Damato N/A
  Mac Os X Hacking Snow Leopard edition Charlie Miller N/A
  Advanced Mac OS X Physical Memory Analysis Matthieu Suiche BH DC 2010
  Advanced Mac OS X Physical Memory Analysis (paper) Matthieu Suiche BH DC 2010
  Post exploitation techniques on OSX and Iphone Vincenzo Iozzo EUSecwest
  Programacion de rootkits en Mac OS X.pdf Fernando López Hernández N/A
  Hacking at Mach speed Dino Dai Zovi N/A
  Mac OS X Return Oriented Exploitation Dino Dai Zovi N/A
  Having Fun with Apples IOKit Ilja van Sprundel N/A
2011      
  Defiling Mac OS X Kernel Rootkits Snare Ruxcon 2011
  Hacking at Mach2 Dino Dai Zovi N/A
  The Apple Sandbox (paper) Dionysus Blazakis BH DC 2011
  The Apple Sandbox Dionysus Blazakis BH DC 2011
  Battery Firmware Hacking Charlie Miller N/A
  Macs in the Age of APT iSEC Partners BH USA 2011
  Protecting the core – Kernel Exploitation mitigations Patroklos Argyroudis &
Dimitris Glynos
BH EU 2011
  Protecting the core – Kernel Exploitation mitigations (paper) Patroklos Argyroudis &
Dimitris Glynos
BH EU 2011
2012      
  Syscan12 – DE MYSTERIIS DOM JOBSIVS: MAC EFI ROOTKITS Snare Syscan Singapore 12
  Hack Mac OS X – Tips and tricks for Mac OS X hack sud0man GSDays 2012
  Ruxcon – DE MYSTERIIS DOM JOBSIVS: MAC EFI ROOTKITS Snare Ruxcon
  How to re-engineer OSX to behave the way you want Stephen Sykes CodeBits 2012
  Mac Memory Analysis with Volatility Andrew Case DFIR Summit
  OS/X Flashback ESET N/A
  When Macs Get Hacked Sarah Edwards DFIR Summit
  Analysis & Correlation of Mac Logs Sarah Edwards DFIR Summit
  Infiltrate the Vault – Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary
& Felix Grobert & Joachim Metz
N/A
  FORENSIC MEMORY ANALYSIS FOR APPLE OS X Andrew F. Hay N/A
  EFI Rootkits Andreas Galauner SIGINT
  DE MYSTERIIS DOM JOBSIVS Mac EFI Rootkits (paper) Snare Black Hat
  DE MYSTERIIS DOM JOBSIVS Mac EFI Rootkits Snare Black Hat
  FLASHBACK OS X MALWARE (paper) Broderick Ian Aquilino VB2012
  FLASHBACK OS X MALWARE Broderick Ian Aquilino VB2012
  Backdoor.Flashback (Russian) Dr Web N/A
  Mac OS X Malware Overview (Russian) Ivan Sorokin ZeroNights
  XNU: A security evaluation Daan Keuper  
2013      
  Destructive DTrace Nemo Infiltrate13
  Revisiting Mac OS X Kernel Rootkits fG! SyScan13
  Mountain Lion and iOS Vulnerabilities Garage Sale Stefan Esser SyScan13
  Mountain Lion and iOS Vulnerabilities Garage Sale (whitepaper) Stefan Esser SyScan13
  OS X Hardening – Mountain Lion 10.8 ERNW N/A
  Ninjas and Harry Potter – “Spell”unking in Apple SMC land Alex Ionescu No Such Con
2014      
  Reverse Engineering Mac Malware Sarah Edwards BsidesNoLA
  Methods of Malware Persistence on OS X Mavericks Patrick Wardle Shakacon
  Methods of Malware Persistence on OS X Mavericks Patrick Wardle VB2014 Seattle
  OS X Yosemite Artifacts – Call history and SMS analysis nofate N/A
  BadXNU – A rotten apple! fG! CODE BLUE
  In lieu of swap: Analyzing compressed RAM in Mac OS X and Linux Andrew Case, Golden G. Richard III DFRWS
2015      
  Fuzzing OS X at Scale Ben Nagy Infiltrate
  Mac OS X Forensics Joaquin Moreno Garijo N/A
  Unauthorized Cross-App Resource Access on MAC OS X and iOS Various Authors N/A
  WRITING BAD @$$ MALWARE FOR OS X Patrick Wardle Infiltrate
  WRITING BAD @$$ MALWARE FOR OS X Patrick Wardle BlackHat US
  DYLIB HIJACKING ON OS X Patrick Wardle Virus Bulletin
  Exposing Gatekeeper Patrick Wardle VB2015 Prague
  Thunderstrike 2: Sith Strike (draft version, briefly available) Trammmell Hudson, Corey Kallenberg & Xeno Kovah BlackHat US
  Thunderstrike 2: Sith Strike (final version) Trammmell Hudson, Corey Kallenberg & Xeno Kovah BlackHat US
  Thunderstrike 2: Sith Strike – A MacBook firmware worm Trammmell Hudson, Corey Kallenberg & Xeno Kovah HITB GSEC
  Is there an EFI monster inside your apple? fG! 44CON
  Is there an EFI monster inside your apple? fG! SyScan360 Beijing
  Is there an EFI monster inside your apple? fG! CODE BLUE
  OS X Kernel is As Strong as its Weakest Part Liang Chen and ShuaiTian Zhao POC
  BadXNU – A rotten apple! fG! SyScan
  Is there an EFI monster inside your apple? fG! No cON Name
  BadXNU – A rotten apple! fG! No cON Name
  IPv6 Hardening Guide for OS-X ERNW N/A
  DTrace + OS X = Fun Andrezj Dyjak Confidence
  Advancing Mac OS X rootkit detection Andrew Case, Golden G. Richard III DFRWS
  Code Signing – Hashed Out Jonathan Levin RSA
2016      
  Memory Corruption is for Wussies! fG! SyScan360 Singapore

iOS

YEARNAMEAUTHOR(S)CONFERENCE
2008      
  Primer on Reversing Jailbroken iPhone Native Applications Shub-Nigurrath N/A
2009      
  Fun and Games with Mac OS X and iPhone Payloads Charlie Miller &
Vicenzo Iozzo
BH EU 2009
  Patching Applications from Apple AppStore with additional protection Reilly N/A
2010      
  iPhone Rootkit? There’s an App for that! Eric Monti ToorCon 2010
  iPhone security model & vulnerabilities Cedric Halbronn &
Jean Sigwald
HITB SecConf 2010
  iPhone Privacy Nicolas Seriot BH DC 2010
  Adding ASLR to jailbroken iPhones Stefan Esser POC 2010
2011      
  iNception – Planting and Extracting Sensitive Data From Your iPhone’s Subconscious Laurent Oudot HITB Amsterdam
  iPhone Data Protection in Depth Jean-Baptiste Bédrune &
Jean Sigwald
N/A
  Auditing iPhone and iPad applications Ilja van Sprundel N/A
  Practical Consideration of iOS Device Encryption Security Jens Heider &
Matthias Boll
N/A
  Apple iOS 4 Security Evaluation Dino Dai Zovi BH US 2011
  Apple iOS 4 Security Evaluation (paper) Dino Dai Zovi BH US 2011
  OVERCOMING iOS DATA PROTECTION TO RE-ENABLE iPHONE FORENSICS Andrey Belenko BH US 2011
  OVERCOMING iOS DATA PROTECTION TO RE-ENABLE iPHONE FORENSICS (paper) Andrey Belenko BH US 2011
  Exploiting the iOS Kernel Stefan Esser BH US 2011
  Exploiting the iOS Kernel (paper) Stefan Esser BH US 2011
  iPhone Exploitation – One ROPe to Bind Them All? Stefan Esser HITB Malaysia 2011
  iPhone Espionage Keith Lee N/A
  Antid0te 2.0 – ASLR in iOS Stefan Esser HITB Amsterdam
  Targeting The IOS Kernel Stefan Esser SysScan11 Singapore
  Baseband Playground Luis Miras Ekoparty 7
  Dont Hassle the Hoff : Breaking iOS code signing Charlie Miller Syscan11 Taipei
  iOS Kernel Exploitation, IOKit Edition Stefan Esser SyScan11 Taipei
  Secure Development on iOS David Thiel PacSec 2011
  An analysis on iOS Jailbreak Huang Heqing N/A
  An analysis on iOS Jailbreak (presentation) Huang Heqing N/A
  Evolution of iOS Data Protection and iPhone Forensics: from iPhone OS to iOS 5 Andrey Belenko &
Dmitry Sklyarov
BH Abu Dhabi 2011
  iOS applications reverse engineering Julien Bachmann SCS 2011
  Apple iPad In the Work Place Russ Spooner N/A
  Attacking and Defending Apple iOS Devices in the Enterprise Tom Eston N/A
  Writing secure iOS applications Ilja van Sprundel N/A
2012      
  iOS5 An Exploitation Nightmare? Stefan Esser CanSecWest 2012
  iOS Application (In)Security Dominic Chell OWASP Ireland
  iOS Application (In)Security (paper) MDSec N/A
  iOS Applications – Different Developers Same Mistakes Paul Craig Syscan12 Singapore
  iOS Kernel Heap Armageddon Stefan Esser Syscan12 Singapore
  Evaluating iOS Applications MDSec OWASP Manchester
  “Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? Andrey Belenko &
Dmitry Sklyarov
BH EU 2012
  “Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? (paper) Andrey Belenko &
Dmitry Sklyarov
BH EU 2012
  Corona Jailbreak for iOS 5.0 Jailbreak Dream Team HiTB Amsterdam
  Corona Jailbreak for iOS 5.0.1 Jailbreak Dream Team HiTB Amsterdam
  Absinthe Jailbreak for iOS 5.0.1 Jailbreak Dream Team HiTB Amsterdam
  iOS 6 Security: A Hacker’s Guide Mark Dowd &
Tarjei Mandt
HiTB KL
  Find Your Own iOS Kernel Bug Xu Hao &
Xiabo Chen
POC
  Practical iOS Apps hacking (paper) Mathieu Renard GreHack
  Defending Data on iOS Securosis, LLC N/A
  Jailbreaking Techniques pod2g WWJC
  Downgrading iOS: SHSH Blobs & APTickets iH8sn0w WWJC
  A Close-Up on Jailbreaking and Tweak Development Nikias Bassen WWJC
  iOS applications auditing Julien Bachmann AppSec Forum
  Pentesting iOS Apps: Runtime Analysis and Manipulation Andreas Kurtz DeepSec
  Practical iOS Apps hacking (slides) Mathieu Renard GreHack
  Hacking iOS Applications Mathieu Renard Hack.lu
2013      
  Attacking the iOS Kernel: A Look at ‘evasi0n’ Tarjei Mandt NIS
  Swiping Through Modern Security Features evad3rs HiTB Amsterdam
  Blackbox analysis of iOS apps Dmitry Evdokimov Zero Nights
2014      
  Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices JONATHAN ZDZIARSKI HOPE/X
  Reversing iOS Apps – a practical approach Patrick Wardle T2
  Exploiting Unpatched iOS Vulnerabilities for Fun and Profit Various Authors N/A
  idb – iOS Blackbox Pentesting Daniel A. Mayer ShmooCon
  Exploring and Exploiting
 iOS Web Browsers Lukasz Pilorz, Marek Zmyslowski HITB Amsterdam
2015      
  iOS 678 Security
 – Study in Fail Stefan Esser SyScan
  Optimized Fuzzing IOKIT in iOS Lei Long BlackHat US
  Optimized Fuzzing IOKIT in iOS (paper) Lei Long BlackHat US
  Review and Exploit Neglected Attack Surface in iOS 8 Pangu Team BlackHat US
  Hacking from iOS 8 to iOS 9 Pangu Team RUXCON/POC

Firmware

YEARNAMEAUTHOR(S)CONFERENCE
2012      
  New Results for Timing-Based Attestation Xeno Kovah, Corey Kallenberg,
Chris Weathers, Amy Herzog,
Matthew Albin, John Butterworth
2012 IEEE Symposium
on Security and Privacy
  No More Hooks: Trustworthy Detection of Code Integrity Attacks Xeno Kovah, Corey Kallenberg,
Chris Weathers, Amy Herzog,
Matthew Albin, John Butterworth
DefCon 20
2013      
  BIOS Chronomancy:
Fixing the Core Root of Trust for Measurement
John Butterworth, Xeno Kovah, Corey Kallenberg BlackHat US
  BIOS Chronomancy:
Fixing the Core Root of Trust for Measurement (paper)
John Butterworth, Xeno Kovah, Corey Kallenberg BlackHat US
2014      
  All Your Boot Are Belong To Us Yuriy Bulygin, Andrew Furtak,
Oleksandr Bazhaniuk, John Loucaides
CanSecWest
  All Your Boot Are Belong To Us Corey Kallenberg, Xeno Kovah,
John Butterworth, Sam Cornwell
CanSecWest
  Attacks on UEFI Security Rafal Wojtczuk, Corey Kallenberg 31c3
  Attacking UEFI Boot Script Rafal Wojtczuk, Corey Kallenberg 31c3
  Copernicus 2: SENTER the Dragon! Corey Kallenberg, Xeno Kovah,
John Butterworth, Sam Cornwell
CanSecWest
  SENTER Sandman: Using Intel TXT to Attack BIOSes Corey Kallenberg, Xeno Kovah,
John Butterworth, Sam Cornwell
HITB
  SENTER Sandman: Using Intel TXT to Attack BIOSes (paper) Corey Kallenberg, Xeno Kovah,
John Butterworth, Sam Cornwell
HITB
  Defeating Signed BIOS Enforcement Corey Kallenberg, Xeno Kovah,
John Butterworth, Sam Cornwell
N/A
  Analyzing UEFI BIOS from Attacker & Defender Viewpoints Corey Kallenberg, Xeno Kovah,
John Butterworth, Sam Cornwell
BlackHat EU
  Into the Unknown: How to Detect BIOS-level attackers Corey Kallenberg, Xeno Kovah,
John Butterworth, Sam Cornwell
VB 2014
  Into the Unknown: Assessing your BIOS vulnerabilities Corey Kallenberg, John Butterworth,
Sam Cornwell, Bob Heinemann
MIRcon
  Extreme Privilege Escalation on Windows 8/UEFI Systems Corey Kallenberg, Xeno Kovah,
John Butterworth, Sam Cornwell
BlackHat US
  Extreme Privilege Escalation on Windows 8/UEFI Systems (paper) Corey Kallenberg, Xeno Kovah,
John Butterworth, Sam Cornwell
BlackHat US
  Setup For Failure: Defeating Secure Boot Corey Kallenberg, Xeno Kovah,
John Butterworth, Sam Cornwell
SyScan
  Setup For Failure: Defeating Secure Boot (paper) Corey Kallenberg, Xeno Kovah,
John Butterworth, Sam Cornwell
SyScan
2015      
  BIOS Necromancy: Utilizing “Dead Code” for BIOS Attacks Corey Kallenberg & Xeno Kovah HITB GSEC
  Betting BIOS Bugs Won’t Bite Y’er Butt? Corey Kallenberg & Xeno Kovah ShmooCon
  How Many Million BIOSes Would you Like to infect? Corey Kallenberg & Xeno Kovah CanSecWest
  How Many Million BIOSes Would you Like to infect? (paper) Corey Kallenberg & Xeno Kovah CanSecWest
  Are you giving firmware attackers a free pass? Corey Kallenberg & Xeno Kovah RSA

评论 2
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值