Deprecated Kernel Extensions and System Extension Alternatives| developer.apple.com
Posted by Brandon Azad, Project Zero In this post I examine Apple's implementation of Pointer Authentication on the A12 SoC used in the...| googleprojectzero.blogspot.com
Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this hardware-based security protection, the attackers used another hardware feature of Apple-designed SoCs.| securelist.com
Japanese version is here . Written by: Akira Moroo ( @retrage ) Yuichi Sugiyama ( @mmxsrup ) Introduction At Ricerca Securi...| ricercasecurity.blogspot.com