Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf

Black Hat via YouTube

Overview

Explore a comprehensive security analysis of Apple's ZeroConf technologies in this 42-minute Black Hat conference talk. Delve into the potential vulnerabilities of automatic device configuration systems like Multipeer Connectivity, Bonjour, and AirDrop. Learn how researchers uncovered serious security flaws that allow for impersonation and Man-in-the-Middle attacks, potentially compromising document printing and file transfers between devices. Examine the fundamental security challenges inherent in ZeroConf techniques and understand why some vulnerabilities persist despite being reported to Apple. Gain insights into the technical details of these attacks and discover why TLS may be inadequate for securing device-to-device communication in ZeroConf scenarios. This presentation by Luyi Xing and Xiaolong Bai offers a critical look at the balance between usability and security in modern portable computing systems.

Syllabus

Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf

Taught by

Black Hat

Reviews

Start your review of Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.