Kröll, Tobias (2021)
ARIstoteles: iOS Baseband Interface Protocol Analysis.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00019397
Bachelorarbeit, Erstveröffentlichung, Verlagsversion
Kurzbeschreibung (Abstract)
The Apple Remote Invocation protocol is not yet publicly known and handles the communication between an Intel baseband chip and the Communication Center on iOS. Thus, it is indirectly controllable via over-the-air interactions, that could be issued from rogue base stations. Finding vulnerabilities in this proprietary protocol may reveal a critical and broad attack surface, that does not even require user interaction. The protocol can be analyzed via fuzzing, debug log outputs and reverse engineering. These informations can then be visualized in a Wireshark dissector, to analyze packet traces. Information about such a protocol help to understand crashes, discover potential security risks or can even be used to uncover unknown configurations and features of the baseband chips.
Typ des Eintrags: | Bachelorarbeit | ||||
---|---|---|---|---|---|
Erschienen: | 2021 | ||||
Autor(en): | Kröll, Tobias | ||||
Art des Eintrags: | Erstveröffentlichung | ||||
Titel: | ARIstoteles: iOS Baseband Interface Protocol Analysis | ||||
Sprache: | Englisch | ||||
Publikationsjahr: | 2021 | ||||
Ort: | Darmstadt | ||||
Kollation: | xi, 61 Seiten | ||||
DOI: | 10.26083/tuprints-00019397 | ||||
URL / URN: | https://tuprints.ulb.tu-darmstadt.de/19397 | ||||
Kurzbeschreibung (Abstract): | The Apple Remote Invocation protocol is not yet publicly known and handles the communication between an Intel baseband chip and the Communication Center on iOS. Thus, it is indirectly controllable via over-the-air interactions, that could be issued from rogue base stations. Finding vulnerabilities in this proprietary protocol may reveal a critical and broad attack surface, that does not even require user interaction. The protocol can be analyzed via fuzzing, debug log outputs and reverse engineering. These informations can then be visualized in a Wireshark dissector, to analyze packet traces. Information about such a protocol help to understand crashes, discover potential security risks or can even be used to uncover unknown configurations and features of the baseband chips. |
||||
Alternatives oder übersetztes Abstract: |
|
||||
Status: | Verlagsversion | ||||
URN: | urn:nbn:de:tuda-tuprints-193972 | ||||
Sachgruppe der Dewey Dezimalklassifikatin (DDC): | 000 Allgemeines, Informatik, Informationswissenschaft > 004 Informatik | ||||
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik 20 Fachbereich Informatik > Sichere Mobile Netze |
||||
Hinterlegungsdatum: | 30 Aug 2021 12:04 | ||||
Letzte Änderung: | 08 Sep 2021 10:59 | ||||
PPN: | |||||
Export: | |||||
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |