Главная
Study mode:
on
1
Intro
2
Baseband Security Assumptions
3
SS7 Attacks
4
Baseband RCE+LPE Strategies?
5
Generation-based Fuzzing + Crash Feedback
6
Modifying vs. Injecting Packets
7
Injection Example: Trace Replay
8
Frankenstein
9
DTrace & AFL
10
Bluetooth Inplace Modification
11
Apple Remote Invocation Format
12
F1: Calling for help...
13
Modifying Existing Packets
14
ICEPicker X): Local AFL++
15
External Blind Corpus-based Injection
16
External radarsa
17
Memory Sanitization
18
Identifying Bottlenecks
19
Statistics
Description:
Explore the security vulnerabilities of the interface between baseband chips and iOS in this 55-minute conference talk. Dive into the challenges of fuzzing this critical interface, which should protect against escalations from the baseband into operating system components. Discover how the implementation is riddled with bugs, leading to various unexpected effects on iPhones, including loss of identity and location information, and accumulation of thousands of undeletable SMS messages. Learn about baseband chip vulnerabilities, Remote Code Execution (RCE) attacks, and the complexities of escalating from baseband to operating system. Gain insights into fuzzing techniques, challenges, and solutions, as well as the broader implications for iOS security and wireless research opportunities on both jailbroken and non-jailbroken devices.

Fuzzing the Phone in the iPhone

media.ccc.de
Add to list
0:00 / 0:00