Articles with tag: Ios
POSTED BY: census / 18.04.2019

CanSecWest 2019

CENSUS has participated in this year's CanSecWest conference with a presentation by Director of Research Patroklos Argyroudis on reverse engineering the Apple iOS sandbox kernel extension entitled Vs com.apple.security.sandbox.


POSTED BY: argp / 18.04.2019

Vs com.apple.security.sandbox (CanSecWest 2019)

On March 20th 2019 I presented at the 2019 CanSecWest conference a talk on reverse engineering the Apple iOS sandbox kernel extension entitled Vs com.apple.security.sandbox. I really enjoyed the conference, traveling to Vancouver, and meeting a lot of people interested in my research.


POSTED BY: sophron / 01.02.2018

The Known Beacons Attack (34th Chaos Communication Congress)

The recent key reinstallation attacks (KRACK) against the WPA2 protocol revealed how an adversary can easily eavesdrop, and in some cases tamper, a Wi-Fi connection secured by the WPA2 protocol. At the same time, Wi-Fi automatic association attacks achieve a similar result (man-in-the-middle position) not by attacking the WPA2 protocol directly but by enforcing Wi-Fi clients to join a rogue Access Point.


POSTED BY: argp / 11.01.2018

iOS kernel exploitation archaeology (34th Chaos Communication Congress)

On December 27th 2017 I presented at the 34th Chaos Communication Congress (34C3) a talk on the technical details and the process of reverse engineering and re-implementation of the evasi0n7 jailbreak's main kernel exploit, titled "iOS kernel exploitation archaeology". Actually, I gave the same talk at the WarCon private event earlier in 2017 (June), but since there were no proceedings or slides published there, I thought it would be a good talk for 34C3! Both events, 34C3 and WarCon, were very well organized, but also very different both in content and of course size. Many thanks to the organizers and volunteers of both these awesome European conferences!