Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

09:56 PM
Connect Directly

Apple Makes Black Hat Debut

But presentation by Apple security team member doesn't reveal any new security details or plans for iOS

BLACK HAT USA -- Las Vegas, NV -- Apple today made its first-ever security presentation at Black Hat USA -- a talk that enumerated and detailed the main security features of its iOS mobile operating system.

Click here for more of Dark Reading's Black Hat articles.

The significance of the presentation by the manager of Apple's platform security team Dallas De Atley was more symbolic than it was revealing: De Atley basically spelled out the key security elements of iOS that the traditionally secretive company recently had quietly published in a white paper. Even so, there was some speculation over whether Apple might pull the presentation from the Black hat lineup at the eleventh hour like it did back in 2008, so De Atley's appearance represented a milestone.

Apple of late has made some subtle shifts in security strategy and approach, including adding automatic updates to OS X Mountain Lion and removing the controversial wording on its Mac website that had claimed Macs "don't get viruses." Its Black Hat USA appearance added another changeup to the list.

"I think it's a big deal. Apple's usually quite secretive about their approaches to all things, not just security. But they've been quietly building quite the security team for several years and it's wonderful to see them opening up and talking about what they are doing," says security researcher Dan Kaminsky. "Like everyone in the industry, they have more work to do. Also like everyone in the industry, they are really starting to do it."

[Apple is quietly making some subtle, incremental security moves in the face of new threats to its products. See 4 Signs That Apple's Sharpening Its Security Game. ]

But famed Apple hacker Charlie Miller says he was disappointed that De Atley's presentation was "straight from the [iOS white] paper" and that he didn't offer a question-and-answer session at the end. "There was nothing in that paper we didn't already know" about iOS security features, says Miller, who doesn't think Apple's talk was significant just because Apple made a public presentation.

Miller, managing principal with Accuvant Labs, says Apple missed an opportunity to provide at least a peek at some upcoming security features.

Apple's De Atley focused on iOS's Secure Boot, personalization, code-signing, sandboxing, and data protection features, all of which aim to reduce the attack surface on the devices.

"No system is going to be perfect. There will always be flaws that are going to be exploited -- we recognize that," De Atley told attendees in his talk. So Apple has built in some security controls into iOS, he said.

Among the features he discussed were Apple's software update mechanism for iOS, which he said has been successful given that 80 percent of iOS customers are running the newest version of iOS, iOS 5.

The application code-signing feature in iOS requires that all executable code is signed by Apple at installation and runtime, he said. All iOS apps that ship with the system as well as third-party apps from Apple's app store all get signed as well. "This is our first line of defense against malware on the device," De Atley said. "That means an entire class of issue can be sidestepped by enforcing that software is verified."

Apple has several layers of signing for third party apps as well. "All software that runs on the device is coming from a known location -- this ties back to our goal of reducing the attack surface for malware on iOS devices," he said, as does the way iOS separates the operating system from the user's data with a series of "partitions" that cordon them off.

Sandboxing, too, is used to isolate and separate various processes on the devices. "So if one process got a flaw and vulnerability, it can't easily wreak havoc on the rest of the systems," De Atley said. And third-party apps are each installed in their own containers.

"There's a layer of abstraction between the app and the rest of the user's data and the container is also sandboxed," he said.

A copy of the Apple iOS white paper with the security specifics is available here for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The security team seem to be taking SiegeWare seriously" 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the filter parameter to cmd.php in an export and exporter_id action. and the filteruid parameter to list.php.
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the export, add_value_form, and dn parameters to cmd.php.
PUBLISHED: 2019-12-05
A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files.
PUBLISHED: 2019-12-05
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough.
PUBLISHED: 2019-12-05
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.