SpeedTalk (Appdome) Where dyld you hide? Leveraging the iOS Mach-O Executable Format and Dynamic Linker (dyld) for Advanced Injection Techniques / Research

September 26, 2024 (GMT +8)
15:30
Ballroom 1 & 2
     

This presentation delves into the iOS Mach-O executable format and the Dynamic Linker (dyld), highlighting their roles in application execution and linking. It will examine how dyld's behavior can be utilized for code injection and runtime manipulation, focusing on dynamic library injection techniques.

Advanced debugging methods will be examined to understand application behaviors prior to execution, along with research methodologies of resolving and using APIs. Real-world examples will demonstrate these techniques, covering their application in both legitimate contexts and potential malicious uses. The session will also address the security implications of these methods and present current mitigation strategies and best practices for protecting iOS applications.

This presentation aims to provide valuable insights for developers and security researchers in navigating and defending against malicious techniques within the iOS environment."

Speaker

Barak Aharoni Barak Aharoni is a Security Researcher at Appdome, specializes in Reverse-Engineering, OS Internals and Mobile Security for both iOS and Android applications. With a great passion for the profession, Barak researches and develops cutting-edge security solutions and techniques to protect mobile applications from emerging threats.

« Back