BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.pass-the-salt.org//pts2021//talk//LQDHNS
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-pts2021-LQDHNS@cfp.pass-the-salt.org
DTSTART;TZID=CET:20210705T140000
DTEND;TZID=CET:20210705T143500
DESCRIPTION:Some iOS mobile applications try to detect whether they are run
 ning on a jailbroken device in order to protect intellectual property\, de
 fend against bots or make sure that they run on a relatively secure device
 .\n\nHowever jailbroken devices are very useful to observe and reverse app
 lications. Those protected with anti-jailbreak code are then more tedious 
 to reverse thus complicating their security assessment or the development 
 of alternatives.\n\nIn this talk we will first present how specific iOS re
 strictions complicate reverse engineering but also reduce the number of to
 ols that can be used by software protection. Then\, we will list different
  methods available to detect jailbreak. Finally\, we will describe how to 
 study and bypass a real-world anti-jailbreak solution with the famous open
 source dynamic instrumentation framework Frida.
DTSTAMP:20260415T222052Z
LOCATION:Zoom room
SUMMARY:Jailbreak detection mechanisms and how to bypass them - Eloi Benois
 t-Vanderbeken
URL:https://cfp.pass-the-salt.org/pts2021/talk/LQDHNS/
END:VEVENT
END:VCALENDAR
