Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Patch Different on Operating Systems - Binary Diffing and Vulnerability Analysis

Objective-See Foundation via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn advanced binary diffing techniques for *OS platforms in this 27-minute conference talk from Objective-See Foundation. Discover how to overcome unique challenges in patch diffing across Apple's ecosystem, including watchOS, tvOS, iOS, and MacOS. Master the use of open-source reverse engineering tools like ipsw and Ghidra to extract and analyze IPSW files, navigate dyld_shared_cache (DSC), and compare binary changes. Follow along with real-world examples that demonstrate how to map binary modifications to recent CVEs and reverse engineer underlying vulnerabilities. Perfect for both newcomers to Apple security research seeking guidance and experienced researchers looking to expand their knowledge of attack surfaces, gain practical insights into using freely available binary diffing tools and methods to understand Apple's security ecosystem better.

Syllabus

#OBTS v7.0: "Patch Different on *OS" - John Mclntosh

Taught by

Objective-See Foundation

Reviews

Start your review of Patch Different on Operating Systems - Binary Diffing and Vulnerability Analysis

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.