Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime

16 Jan 2020 33:30 1
589
Black Hat Download
7 0

In this talk, we will share reverse engineering results of FaceTime, with a focus on the process of the initialization and connection of a FaceTime call. Along with the attacker-controlled data propagation path, we will discuss different attack surfaces for FaceTime.

By Tao Huang and Tielei Wang

Full Abstract & Presentation Materials: https://www.blackhat.com/us-19/briefings/schedule/#towards-discovering-remote-code-execution-vulnerabilities-in-apple-facetime-15436

Related of "Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime" Videos