Posts Tagged ‘exploitation’

Shellcode on an iPhone

June 16, 2009 Leave a comment

The details are very sparse but in a week or so all bets will be off. According to Ars Technica, Charlie Miller and Vincenzo Iozzo will be presenting a technique at BlackHat USA that allows an attacker to run arbitrary shellcode on an iPhone. The only real details about the attack are that they figured out a way around code signing protections. Code signing protections made it very hard to exploit vulnerable programs on the iPhone since the only code that could be run was code that Apple has reviewed. This makes it much easier for viruses, worms, etc to be written for the iPhone!

Categories: iPhone Tags: ,