Targeting the iOS Kernel - Reverse Engineering Mac OS X
Targeting the iOS Kernel - Reverse Engineering Mac OS X
Targeting the iOS Kernel - Reverse Engineering Mac OS X
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Attacking from User Space - Syscalls<br />
• syscalls are directly callable from user space<br />
• for all <strong>OS</strong> X syscalls source code is available<br />
• however <strong>i<strong>OS</strong></strong> has 8 additional syscalls<br />
• after syscall table is found syscall handlers can be audited<br />
Stefan Esser • <strong>Targeting</strong> <strong>the</strong> <strong>i<strong>OS</strong></strong> <strong>Kernel</strong> • April 2011 •<br />
40