Behind the Scenes of iOS and Mac Security

Behind the Scenes of iOS and Mac Security

Black Hat via YouTube Direct link

Helping users find lost devices, even when offline

26 of 31

26 of 31

Helping users find lost devices, even when offline

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Behind the Scenes of iOS and Mac Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Gatekeeper macOS Catalina
  3. 3 User Data Protections Data that requires user consent to access
  4. 4 Two Critical Challenges
  5. 5 Unrestricted Direct Memory Access
  6. 6 Direct Memory Access with VT-d
  7. 7 DMA Protection for Thunderbolt
  8. 8 DMA Protection for PCle Bus 0
  9. 9 PCle Option ROMS
  10. 10 OROM Sandbox
  11. 11 EFI Exploit Mitigations
  12. 12 Mac Secure Boot Summary
  13. 13 Software Enforced Code Integrity Before iOS 9
  14. 14 Kernel Integrity Protection vo
  15. 15 Lessons Learned
  16. 16 Kernel Integrity Protection v1: Read-Only Data
  17. 17 Kernel Integrity Protection v2
  18. 18 Fast Permission Restrictions (APRR) iPhone X
  19. 19 Pre-APRR VM Permissions
  20. 20 APRR: JavaScriptCore Execution Threads
  21. 21 APRR: JavaScriptCore JIT Compiler Thread
  22. 22 Protecting Userland Integrity
  23. 23 Page Protection Layer (PPL) iPhone XS
  24. 24 Page Protection Layer Summary
  25. 25 Pointer Authentication
  26. 26 Helping users find lost devices, even when offline
  27. 27 Security and Privacy Goals Protect owners, finders, and devices
  28. 28 Introduced in 2016
  29. 29 Making It Easier to Get Started with iOS Research
  30. 30 iOS Security Research Device program
  31. 31 Apple Security Bounty Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.