Nytro Posted December 18, 2011 Report Posted December 18, 2011 Reverse Engineering Mac OS XMac OS X - 2005 and beforeMach-O Infection.ppt (presentation)Breaking Mac OS X.ppt (presentation)Hacking Mac OS X Kernel for unsupported machines.pdf (paper)MacOS Kernel Insecurity.pdf (presentation)Overriding Mac OS X.pdf (paper)A Debugger with Gui in OS X.pdf (paper) - 2006Abusing Mach on Mac OS X.pdf (paper) - 2007Hacking Leopard.pdf (paper)Inside the Mac_OS X_kernel.pdf (paper) - 2008BlackHat-Japan-08-Miller-Hacking-OSX.pdf (presentation)BH-US-08-Dtrace The Reverse Engineer’s Unexpected Swiss Army Knife (presentation)iRK – Crafting OS X Kernel Rootkits (presentation)RETrace – Applied Reverse Engineering on OS X – defcon-16.pdf (presentation)Under the iHood – REcon 2008.pdf (presentation)Covering-tracks-Mac-OS-leopard_5991.pdf (paper)OSX_Rootkits – the next level.pdf (presentation) - 2009Advanced Mac OSX Rootkits.pdf (paper)Defcon-17-bosse_eriksson-kernel_patching_on_osx.pdf (presentation)D1T1 – Dino Dai Zovi – Mac OS Xploitation.pdf (presentation)Advanced-Mac-OS-X-rootkits.pdf (presentation)Dynamic Tracing for Exploitation and Fuzzing-final.pdf (presentation)Mac-os-malware-analysis_33178.pdf (paper)Objective-c-internals.pdf (presentation)Hacking Macs for Fun and Profit – csw09-daizovi-miller.pdf (presentation)Macos xploitation-source2009.pdf (presentation)Debugging Cocoa with DTrace.pdf (paper)BlackHat-DC-09-Iozzo-Macho-on-the-fly.pdf (presentation)Dynamically Overriding Mac OS X – Down the Rabbit Hole.pdf (presentation)Encryption Wrapper on OSX.pdf (presentation) - 2010Function-hooking-for-OSX-and-Linux.pdf (presentation)Mac Os X Hacking SnowLeopard.ppt (presentation)BH-DC-2010-Advanced-Mac-OS-X-Physical-Memory-Analysis-slides.pdf (presentation)BH-DC-2010-Advanced-Mac-OS-X-Physical-Memory-Analysis-wp.pdf (paper)Post exploitation techniques on OSX and Iphone – eusecwest.pdf (presentation)Programacion de rootkits en Mac OS X.pdf (paper, in Spanish) - 2011Defiling-Mac-OS-X-Kernel-Rootkits-Ruxcon.pdf (presentation)Hacking at mach2.pdf (presentation)The Apple Sandbox – BHDC2011-Paper.pdf (paper)The Apple Sandbox – BHDC2011-Slides.pdf (presentation)Battery Firmware Hacking.pdf (paper)iSEC_BH2011 – Macs in the Age of APT.pdf (presentation) iOS - 2009BlackHat-Europe-2009-Miller-Iozzo-OSX-IPhone-Payloads-whitepaper.pdf (paper) - 2010iPhone Rootkit Toorcon 2010.pdf (presentation)D2T1 – Cedric Halbronn and Jean Sigwald – iPhone Security Model.pdf (presentation) - 2011D1T2 – Laurent Oudot – Extracting Senstive Data from Your iPhone.pdf (presentation)D2T2 – Jean-Baptiste Be?drune & Jean Sigwald – iPhone Data Protection in Depth.pdf (presentation)Auditing iPhone and iPad applications – van Sprundel.ppt (presentation)Practical Consideration of iOS Device Encryption Security.pdf (paper)Apple iOS 4 Security Evaluation.pdf (presentation)BH_US_11_DaiZovi_iOS_Security_WP.pdf (paper)BH_US_11_Belenko_iOS_Forensics_Slides.pdf (presentation)BH_US_11_Belenko_iOS_Forensics_WP.pdf (paper)BH_US_11_Esser_Exploiting_The_iOS_Kernel_Slides.pdf (presentation)BH_US_11_Esser_Exploiting_The_iOS_Kernel_WP.pdf (paper)D2T1 – Stefan Esser – iPhone Exploitation – One ROPe to Bind Them All.pdf (presentation)D2 SIGINT – Keith Lee – iPhone Espionage.pdf (presentation)D1T1 – Stefan Esser – Antid0te 2.0 – ASLR in iOS.pdf (presentation)SysScan-Singapore-Targeting_The_IOS_Kernel.pdf (presentation)Sursa: Papers | Reverse Engineering Mac OS X Quote