Targeting the iOS Kernel - Reverse Engineering Mac OS X
Targeting the iOS Kernel - Reverse Engineering Mac OS X
Targeting the iOS Kernel - Reverse Engineering Mac OS X
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Finding Vulnerabilities in <strong>the</strong> <strong>i<strong>OS</strong></strong> <strong>Kernel</strong> (III)<br />
• source code of kernel extensions is less likely to be desync<br />
• however only a small subset of kernel extensions have source code available<br />
• finding vulnerabilities in <strong>i<strong>OS</strong></strong> kernel extension requires binary analysis<br />
Stefan Esser • <strong>Targeting</strong> <strong>the</strong> <strong>i<strong>OS</strong></strong> <strong>Kernel</strong> • April 2011 •<br />
8