Blog Post

Prmagazine > News > News > Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities
Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

Apple launched New iPhone The company’s new A19 and A19 Pro Chips loaded on Tuesday. And one Ultra-thin iPhone air and other redesignsthe new phone has undergone a less flashy upgrade, which may be a real killer feature. A security improvement called “memory integrity enforcement” will always be combined with chip-level protection with software defenses to compare iPhones with the most common (usually exploited) software vulnerabilities.

In recent years, movement across the global tech industry has been steadily developing to address a ubiquitous sinister type of bug called memory security vulnerability. Computer memory is a shared resource in all programs. Memory security issues arise when software can limit data from computer memory or manipulate data in programs. When developers (even experienced and security-oriented developers) write software in ubiquitous historic programming languages ​​such as C and C++, it is easy to make mistakes that lead to memory security vulnerability. That’s why proactive tools like this Special programming languages The purpose of the surge is to make it structurally impossible for software to include these vulnerabilities rather than trying to avoid introducing them or catching all of them.

The NSA and Cybersecurity and Infrastructure Security Agency “The importance of memory security cannot be exaggerated” Write in June’s report. “The consequences of memory security breaches can be serious, ranging from data breaches to system crashes and operational disruptions.”

Apple’s Swift programming language was released in 2014 and is memory-safe. The company said it has written new code in Swift for years and is trying to strategically overhaul and rewrite existing code in the memory security language to make its system safer. This reflects the memory security challenges across the industry, because even if new code is written more firmly, the world’s software has been written in a memory-insecurity language for decades. And, in general, Apple’s lockdown ecosystem has so far been successfully preventing widespread malware attacks against iPhones, especially motivated attackers Spyware makerspecific victims who still target high costs iPhone development complex iOS exploit chains.

Even though Apple has begun overhauling its code to ensure memory security, the company has found that these rare attack chains still actually always include development for memory errors.

“The known mercenary spy chains used for iOS share a common denominator with people targeting windows and Android: they take advantage of interchangeable, powerful and vulnerable memory security that exists throughout the industry,” Apple wrote in its Apple. Memory integrity execution announcement Wednesday.

Apple is increasingly investing in memory security through fast and secure memory allocators, which memory allocators “allocate” what memory areas and “divides” the data of this data, which is the main factor and source of memory security vulnerabilities. However, memory integrity execution itself is initially inspired by hardware-level work, and even if the system suffers from memory corruption, it is also inspired to protect code integrity.

Source link

Leave a comment

Your email address will not be published. Required fields are marked *

star360feedback Recruitgo