#OBTS
Автор: Objective-See Foundation
Загружено: 2024-12-17
Просмотров: 12080
Описание:
Slides: https://objectivebythesea.org/v7/talk...
Talk Description:
Despite the substantial market share of iOS devices in the mobile industry, the tools dedicated to security analysis of iOS applications remain dangerously limited. Consequently, many applications never receive proper scrutiny for both malware and vulnerabilities.
This presentation strives to resolve the limited resources for iOS Reverse Engineering by introducing a new tool to the security research community: an open-source iOS decompiler. iOS Mach-O binaries present unique challenges during decompilation due to their intricate structure. We'll delve into iOS application analysis, covering everything from reconstructing resources and libraries to automatically tracing application lifecycle methods for accurate control flow reconstruction. These remediations in addition to custom code modifications produce a more intuitive view of decompiled code for both Objective-C and Swift binaries.
By the end of this talk, attendees will gain: A comprehensive understanding of iOS application structure and analysis techniques, Insights into automating the traditionally manual process of iOS reverse engineering, Access to a brand-new, open-source iOS decompiler, for the security research community.
Speaker's Bio:
👤 Laurie Kirk, (@lauriewired) is a Reverse Engineer specializing in cross-platform malware analysis with a focus on mobile threats.
She also runs a YouTube channel (@LaurieWired) that covers all sorts of in-depth Malware Analysis, Reverse-Engineering, Exploitation, and security topics. She has spoken at multiple conferences including Objective by the Sea v6.0, DEFCON, TROOPERS23, KernelCon, BlueHat, and BSides Seattle.
Support the Objective-See Foundation:
https://www.objective-see.org/
https://x.com/objective_see/
/ objective-see
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: