Главная
Study mode:
on
1
Introduction
2
Boundary Protocol
3
Traditional Network
4
Example
5
Printer
6
Why did it happen
7
Airdrop
8
Airdrop Example
9
Recap
10
Customization
11
MultiPure Connectivity
12
Unique IDs
13
Zero Configuration
14
Summary
15
Measurement Study
16
Defense Mini
17
Conclusion
18
Questions
Description:
Explore a comprehensive analysis of security vulnerabilities in Apple's ZeroConf systems in this IEEE conference talk. Delve into the lack of security considerations in major ZeroConf frameworks on Apple platforms, including Core Bluetooth Framework, Multipeer Connectivity, and Bonjour. Examine how popular apps and system services like Tencent QQ, Apple Handoff, printer discovery, and AirDrop are susceptible to impersonation and Man-in-the-Middle attacks. Understand the serious consequences of these vulnerabilities, such as theft of SMS messages, email notifications, and documents. Learn about the fundamental security challenges in ZeroConf techniques and discover newly developed protection methods, including conflict detection and a biometric approach using voice recognition. Gain insights from security analysis and user studies involving 60 participants, demonstrating the effectiveness and user acceptance of these new protection measures against emerging threats like speech synthesis attacks. Read more

Staying Secure and Unprepared - Understanding and Mitigating the Security Risks of Apple ZeroConf

IEEE
Add to list