Achieving a successful remote compromise of a modern Apple iOS device has become in recent years particularly challenging for an adversary, thanks to all the good work done by Apple. Nevertheless in this talk we will describe our ideas and methods, which lead us to successfully compromise a updated iOS device remotely, at Mobile Pwn2Own 2016 in Tokyo, and other attack chains that couldn't make it at the competition. In particular, but not limited to, we will cover: - The sandbox and escaping it - Rogue Application Install and Codesign Bypass - Alternative ideas for remote attack chains.Back to Open CFP
It is going to be a quite fun talk since it has not been shown long enough to compromise modern iOS device remotely.
Has promise, please don't disappoint!
Looking forward to this presentation!
We are pleased to announce the Call For Papers for INFILTRATE 2018 is now open. If you would like to present and have an offense-focused-fresh-content presentation, please submit an abstract, Bio and headshot to firstname.lastname@example.org. This information will be included on our Open CFP site, here, where the public can vote on which presentations they are most interested in seeing at INFILTRATE. Call for papers will close on December 14th, 2017. Shortly after this date, the winning speakers will be notified.
Some of the benefits of speaking at INFILTRATE are: