BlackHat NEWS: BEHIND THE SCENES OF IOS SECURITY

With over a billion active devices and in-depth security protections spanning every layer from silicon to software, Apple works to advance the state of the art in mobile security with every release of iOS. We will discuss three iOS security mechanisms in unprecedented technical detail, offering the first public discussion of one of them new to iOS 10.


HomeKit, Auto Unlock and iCloud Keychain are three Apple technologies that handle exceptionally sensitive user data – controlling devices (including locks) in the user’s home, the ability to unlock a user’s Mac from an Apple Watch, and the user’s passwords and credit card information, respectively. We will discuss the cryptographic design and implementation of our novel secure synchronization fabric which moves confidential data between devices without exposing it to Apple, while affording the user the ability to recover data in case of device loss.

Data Protection is the cryptographic system protecting user data on all iOS devices. We will discuss the Secure Enclave Processor present in iPhone 5S and later devices and explain how it enabled a new approach to Data Protection key derivation and brute force rate limiting within a small TCB, making no intermediate or derived keys available to the normal Application Processor.

Traditional browser-based vulnerabilities are becoming harder to exploit due to increasingly sophisticated mitigation techniques. We will discuss a unique JIT hardening mechanism in iOS 10 that makes the iOS Safari JIT a more difficult target.

Ivan Krstic

Source: BlackHat News

About heritier kandolo

CEO at rootandadmin Administrateur Systèmes et Réseaux Spécialiste en : • Langage de Script : Bash, PowerShell, AppleScript • Maintenance : Systèmes, Réseaux, Ordinateurs Maitrise : • Microsoft Certified Solution Associate MCSA Windows Server 2012 • Microsoft Certified Trainer MCT • Microsoft Office Master : Office 2013 • Microsoft Technology Associate: Windows Server Administration Fundamentals • Microsoft Technology Associate: Networking Fundamentals • Microsoft Technology Associate: Cloud Fundamentals • GNU Linux • Latex (Pour le traitement de texte) • MacOs

Check Also

(Français) Predator 21 X, le monstre gaming d’Acer

Predator 21 X, le monstre gaming d’Acer Acer a levé le voile sur le Predator …

Leave a Reply

Your email address will not be published. Required fields are marked *