Targeting the iOS Kernel - Reverse Engineering Mac OS X
Targeting the iOS Kernel - Reverse Engineering Mac OS X
Targeting the iOS Kernel - Reverse Engineering Mac OS X
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Zynamic‘s BinDiff<br />
• Zynamic‘s BinDiff is a great tool<br />
• not only to find differences in binaries<br />
• but also to port symbols<br />
• even cross platform<br />
• Using BinDiff to diff <strong>OS</strong> X kernel against <strong>i<strong>OS</strong></strong> 4.3.2<br />
• works but initally gives bad results<br />
• o<strong>the</strong>r ways to add symbols are required<br />
• BinDiff can <strong>the</strong>n be repeated<br />
Stefan Esser • <strong>Targeting</strong> <strong>the</strong> <strong>i<strong>OS</strong></strong> <strong>Kernel</strong> • April 2011 •<br />
31