BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.cccv.de//CUFLJP
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-38c3-CUFLJP@cfp.cccv.de
DTSTART;TZID=CET:20241228T133000
DTEND;TZID=CET:20241228T143000
DESCRIPTION:My talk explores the trajectory of iOS spyware from the initial
  discovery of Pegasus in 2016 to the latest cases in 2024.\n\nThe talk wil
 l start with an analysis how exploits\, infection vectors and methods of c
 ommercial spyware on iOS have changed over time.\n\nThe second section of 
 the talk is all about advances in detection methods and the forensic sourc
 es which are available to discover commercial spyware. This talk will also
  include a Case Study about the discovery and analysis of BlastPass (one o
 f the latest NSO Exploits).\n\nThe third part will discuss technical chall
 enges and limitations of the detections methods and data sources.\n\nFinal
 ly\, I will conclude the talk with open research topics and suggestions wh
 at Apple or we could technically do to make the detection of commercial sp
 yware better.
DTSTAMP:20241227T122713Z
LOCATION:Saal GLITCH
SUMMARY:From Pegasus to Predator - The evolution of Commercial Spyware on i
 OS - Matthias Frielingsdorf
URL:https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/CUFLJP/
END:VEVENT
END:VCALENDAR
