User Data Protections Data that requires user consent to access
4
Two Critical Challenges
5
Unrestricted Direct Memory Access
6
Direct Memory Access with VT-d
7
DMA Protection for Thunderbolt
8
DMA Protection for PCle Bus 0
9
PCle Option ROMS
10
OROM Sandbox
11
EFI Exploit Mitigations
12
Mac Secure Boot Summary
13
Software Enforced Code Integrity Before iOS 9
14
Kernel Integrity Protection vo
15
Lessons Learned
16
Kernel Integrity Protection v1: Read-Only Data
17
Kernel Integrity Protection v2
18
Fast Permission Restrictions (APRR) iPhone X
19
Pre-APRR VM Permissions
20
APRR: JavaScriptCore Execution Threads
21
APRR: JavaScriptCore JIT Compiler Thread
22
Protecting Userland Integrity
23
Page Protection Layer (PPL) iPhone XS
24
Page Protection Layer Summary
25
Pointer Authentication
26
Helping users find lost devices, even when offline
27
Security and Privacy Goals Protect owners, finders, and devices
28
Introduced in 2016
29
Making It Easier to Get Started with iOS Research
30
iOS Security Research Device program
31
Apple Security Bounty Summary
Description:
Explore a comprehensive Black Hat conference talk delving into the intricate security mechanisms of iOS and macOS. Gain insights into the Find My feature's privacy-preserving implementation, including the elliptic curve key diversification system. Discover Gatekeeper improvements in macOS Catalina, user data protections, and solutions to critical challenges like unrestricted direct memory access. Learn about DMA protection for Thunderbolt and PCIe, EFI exploit mitigations, and Mac Secure Boot. Examine the evolution of Kernel Integrity Protection, fast permission restrictions (APRR), and userland integrity safeguards. Understand the Page Protection Layer (PPL) and Pointer Authentication features. Investigate the security and privacy goals of the Find My feature for offline devices. Get information on Apple's iOS Security Research Device program and Security Bounty initiative, aimed at facilitating iOS research and enhancing overall system security.