Загрузка страницы

DEF CON 27 - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space

Pointer Authentication (in short, PAuth) is the latest security mechanism in iOS. It is proposed to protect the integrity of pointers with hardware-assisted encryption, thus eliminating the threats of code-reuse attacks. In PAuth, a cryptographic signature called PAC is calculated from a pointer value and inserted into the pointer. When the pointer is about to be used, the PAC is extracted and verified whether it is consistent with the original pointer value. In this way, PAuth is able to ensure that the pointers are not tampered. iOS deployed PAuth in user-space system services, protecting pointers that may affect the control flow and preventing code-reuse attacks like ROP and JOP.

However, in our study, we found that a fatal flaw in the implementation of iOS PAuth makes user-space system services till vulnerable to code-reuse attacks. The flaw is: iOS uses the same signing key in different user-space processes. This flaw allows a signed pointer from a malicious process can be correctly verified in a system service, thus making it possible to launch JOP. In this talk, we will explain how we found the flaw and why it is inevitable. In advance, we will demonstrate how to leverage this flaw and launch JOP attacks in a PAuth-protected system service. Also, we will propose a new tool, PAC-gadget, to automatically find JOP gadgets in PAuth-protected binaries.

Видео DEF CON 27 - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space канала HackersOnBoard
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
6 декабря 2019 г. 3:04:30
00:38:57
Другие видео канала
DEF CON 27 - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration InterfacesDEF CON 27 - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration InterfacesDEF CON 27 - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory DominanceDEF CON 27 - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory DominanceDEF CON 27 - More Keys Than A Piano: Finding Secrets In Publicly Exposed Ebs VolumesDEF CON 27 - More Keys Than A Piano: Finding Secrets In Publicly Exposed Ebs VolumesDEF CON 27 - All the things you wanted to know about the DEF CON NOC and we won't tell you aboutDEF CON 27 - All the things you wanted to know about the DEF CON NOC and we won't tell you aboutDEF CON 27 - smea - Adventures In Smart Buttplug Penetration testingDEF CON 27 - smea - Adventures In Smart Buttplug Penetration testingDEF CON 27 - Patrick Wardle - Harnessing Weapons of Mac DestructionDEF CON 27 - Patrick Wardle - Harnessing Weapons of Mac DestructionDEF CON 27 - WillC - Phreaking ElevatorsDEF CON 27 - WillC - Phreaking ElevatorsDEF CON 27 - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The AirDEF CON 27 - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The AirDEF CON 27 - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection AttacksDEF CON 27 - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection AttacksDEF CON 27 - Omer Yair - Exploiting Windows Exploit Mitigation for ROP ExploitsDEF CON 27 - Omer Yair - Exploiting Windows Exploit Mitigation for ROP ExploitsDEF CON 27 - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the GovernmentDEF CON 27 - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the GovernmentDEF CON 27 - Truman Kain - Surveillance Detection Scout Your Lookout on AutopilotDEF CON 27 - Truman Kain - Surveillance Detection Scout Your Lookout on AutopilotDEF CON 27 - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android VendorsDEF CON 27 - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android VendorsDEF CON 27 - No Mas How One Side-Channel Flaw Opens Atm Pharmacies & Government Secrets Up to AttackDEF CON 27 - No Mas How One Side-Channel Flaw Opens Atm Pharmacies & Government Secrets Up to AttackDEF CON 27 - Roger Dingledine - The Tor Censorship Arms Race The Next ChapterDEF CON 27 - Roger Dingledine - The Tor Censorship Arms Race The Next ChapterDEF CON 27 - Backdooring Hardware Devices By Injecting Malicious Payloads On MicrocontrollersDEF CON 27 - Backdooring Hardware Devices By Injecting Malicious Payloads On MicrocontrollersDEF CON 27 - Intro to Embedded Hacking-How you can find a decade old bug in widely deployed devicesDEF CON 27 - Intro to Embedded Hacking-How you can find a decade old bug in widely deployed devicesDEF CON 27 - Behind the Scenes The Industry of Social Media Manipulation Driven by MalwareDEF CON 27 - Behind the Scenes The Industry of Social Media Manipulation Driven by MalwareDEF CON 27 - XiaoHuiHui - All the 4G Modules Could Be HackedDEF CON 27 - XiaoHuiHui - All the 4G Modules Could Be HackedDEF CON 27 - Confessions of an Nespresso Money Mule Free Stuff and Triangulation FraudDEF CON 27 - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud
Яндекс.Метрика