Please sign in to comment.
- Loading branch information...
|@@ -3,12 +3,13 @@|
|iOS applications have become an increasingly popular targets for hackers, reverse engineers, and software pirates. In this presentation, we discuss the current state of iOS attacks, review available security APIs, and reveal why they are not enough to defend against known threats. For high-risk applications, novel protections that go beyond those offered by Apple are required. As a solution, we discuss the design of the [Mobile Application Security Toolkit (MAST)](https://www.trailofbits.com/products/#mast) which ties together jailbreak detection, anti-debugging, and anti-reversing in LLVM to address these risks.|
|* [Slides](/iOS%20Application%20Security/iOS%20Application%20Security_notes.pdf) and [Video](http://original.livestream.com/etsycodeascraft/video?clipId=pla_d62e2a22-e7b8-4140-9b92-44c41c07c1cb)|
|* [Slides](/iOS%20Application%20Security/iOS%20Application%20Security_notes.pdf), [Etsy Video](http://original.livestream.com/etsycodeascraft/video?clipId=pla_d62e2a22-e7b8-4140-9b92-44c41c07c1cb), [QCon Video](https://www.infoq.com/presentations/ios-security)|
|* [MAST](https://www.appsecuritytoolkit.com/), the Mobile Application Security Toolkit|
|* [ReMASTering Applications by Obfuscating during Compilation](https://blog.trailofbits.com/2014/08/20/remastering-applications-by-obfuscating-during-compilation/)|
|* Etsy [Code as Craft](https://codeascraft.com/speakers/sophia-dantoine-modern-application-security-for-ios/)|
|* [QCon NYC 2016](https://www.infoq.com/presentations/ios-security)|
|* Sophia D'Antoine|