31.12.2012 Views

Targeting the iOS Kernel - Reverse Engineering Mac OS X

Targeting the iOS Kernel - Reverse Engineering Mac OS X

Targeting the iOS Kernel - Reverse Engineering Mac OS X

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Finding Vulnerabilities in <strong>the</strong> <strong>i<strong>OS</strong></strong> <strong>Kernel</strong> (III)<br />

• source code of kernel extensions is less likely to be desync<br />

• however only a small subset of kernel extensions have source code available<br />

• finding vulnerabilities in <strong>i<strong>OS</strong></strong> kernel extension requires binary analysis<br />

Stefan Esser • <strong>Targeting</strong> <strong>the</strong> <strong>i<strong>OS</strong></strong> <strong>Kernel</strong> • April 2011 •<br />

8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!