The Perfect Gift: Any Class, Never Expires
AI Adoption - Drive Business Value and Organizational Impact
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the inner workings of Apple's XProtect Remediator (XPR) through comprehensive reverse engineering analysis in this 40-minute Black Hat conference presentation. Discover how security researchers overcame the challenges of analyzing stripped Swift binaries by developing custom static and dynamic analysis tools specifically designed for Swift code examination. Learn about XPR's sophisticated detection mechanisms that extend far beyond simple YARA rule scanning, including an innovative OCR-based system for identifying malware that bypasses Gatekeeper protections. Examine Apple's exclusive threat intelligence embedded within XPR, including detection logic for advanced threats like the TriangleDB macOS implants. Understand how XPR leverages a custom Domain-Specific Language (DSL) built with Swift Result Builders—the same technology powering SwiftUI—to describe complex detection logic in a declarative manner. Investigate the novel Provenance Sandbox mechanism that tracks the origin of remediated files, providing valuable forensic artifacts for security analysis. Gain insights into XPR vulnerabilities and Provenance Sandbox bypass techniques that benefit both defensive blue teams working on macOS security and offensive red teams conducting security assessments. Access the presentation materials and custom analysis tools that enable ongoing research into XPR updates and Apple's evolving threat intelligence capabilities.
Syllabus
XUnprotect: Reverse Engineering macOS XProtect Remediator
Taught by
Black Hat