Reversing to Engineer: Learning to ‘Secure’ XPC from a Patch

How reversing Apple’s ‘RootPipe’ patch provided the means to secure TaskExplorer’s XPC service

How reversing Apple’s ‘RootPipe’ patch provided the means to secure TaskExplorer’s XPC service


Print Share Comment Cite Upload Translate
APA
() » Reversing to Engineer: Learning to ‘Secure’ XPC from a Patch. Retrieved from https://www.truth.cx/2021/02/10/reversing-to-engineer-learning-to-secure-xpc-from-a-patch/.
MLA
" » Reversing to Engineer: Learning to ‘Secure’ XPC from a Patch." - , https://www.truth.cx/2021/02/10/reversing-to-engineer-learning-to-secure-xpc-from-a-patch/
HARVARD
» Reversing to Engineer: Learning to ‘Secure’ XPC from a Patch., viewed ,
VANCOUVER
- » Reversing to Engineer: Learning to ‘Secure’ XPC from a Patch. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2021/02/10/reversing-to-engineer-learning-to-secure-xpc-from-a-patch/
CHICAGO
" » Reversing to Engineer: Learning to ‘Secure’ XPC from a Patch." - Accessed . https://www.truth.cx/2021/02/10/reversing-to-engineer-learning-to-secure-xpc-from-a-patch/
IEEE
" » Reversing to Engineer: Learning to ‘Secure’ XPC from a Patch." [Online]. Available: https://www.truth.cx/2021/02/10/reversing-to-engineer-learning-to-secure-xpc-from-a-patch/. [Accessed: ]
Select a language: