Overview
Watch a 27-minute conference talk from Objective by the Sea v7.0 exploring the development of an open-source iOS decompiler to address the limited availability of iOS application security analysis tools. Learn about the unique challenges of decompiling iOS Mach-O binaries, techniques for reconstructing resources and libraries, and methods for automatically tracing application lifecycle for accurate control flow reconstruction. Discover how to improve the analysis of both Objective-C and Swift binaries through custom code modifications that produce more intuitive decompiled code views. Gain comprehensive knowledge of iOS application structure, learn to automate traditionally manual iOS reverse engineering processes, and access a new open-source tool designed for the security research community. Presented by Laurie Kirk, a Reverse Engineer specializing in cross-platform malware analysis and mobile threats, who runs an educational YouTube channel covering malware analysis, reverse-engineering, exploitation, and security topics.
Syllabus
#OBTS v7.0: "iDecompile: Writing a Decompiler for iOS Applications" - Laurie Kirk
Taught by
Objective-See Foundation