Apple’s Security Engineering and Architecture head, Ivan Krstic, recently gave a lecture at 2016 Black Hat USA, titled Behind the Scenes of iOS Security, earlier this month.
It was here, Krstic also announced Apple’s new Bug Bounty Program, where researchers would be paid up to $200,000 to find iOS and Mac vulnerabilities.
Krstic announced on Twitter this afternoon the video of his talk is now online for everyone to view. The video description is below:
With over a billion active devices and in-depth security protections spanning every layer from silicon to software, Apple works to advance the state of the art in mobile security with every release of iOS. We will discuss three iOS security mechanisms in unprecedented technical detail, offering the first public discussion of one of them new to iOS 10.
HomeKit, Auto Unlock and iCloud Keychain are three Apple technologies that handle exceptionally sensitive user data – controlling devices (including locks) in the user’s home, the ability to unlock a user’s Mac from an Apple Watch, and the user’s passwords and credit card information, respectively. We will discuss the cryptographic design and implementation of our novel secure synchronization fabric which moves confidential data between devices without exposing it to Apple, while affording the user the ability to recover data in case of device loss.
Data Protection is the cryptographic system protecting user data on all iOS devices. We will discuss the Secure Enclave Processor present in iPhone 5S and later devices and explain how it enabled a new approach to Data Protection key derivation and brute force rate limiting within a small TCB, making no intermediate or derived keys available to the normal Application Processor.
Traditional browser-based vulnerabilities are becoming harder to exploit due to increasingly sophisticated mitigation techniques. We will discuss a unique JIT hardening mechanism in iOS 10 that makes the iOS Safari JIT a more difficult target.
It’s pretty technical stuff, but if you’re versed in security mechanisms, you’ll find the presentation interesting (otherwise it’ll be “all Greek to you”). For those curious about the Bug Bounty Program, the announce is made just after the 36-minute mark.
Check out the 51-minute video below: