Posted on
in Presentations
This talk will go through the process of an investigation of a recently published Apple sandbox escape zero-day. The process of uncovering a novel vulnerability is not an easy one; it is tedious and error-prone, requiring various methods and procedures. The talk will go through the various steps, from initiation to full discovery and analysis.
Join the RSAC™ Professional Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community