Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos

作者:Bai, Xiaolong*; Xing, Luyi; Zhang, Nan; Wang, XiaoFeng; Liao, Xiaojing; Li, Tongxin; Hu, Shi-Min
来源:IEEE Security & Privacy, 2017, 15(2): 42-49.
DOI:10.1109/MSP.2017.23

摘要

Usability-oriented zero configuration (ZeroConf) designs, with automatic service discovery "plug-and-play" techniques, give rise to security risks. A study focusing on Apple-a major proponent of ZeroConf-brings to light a disturbing lack of security: major ZeroConf components are mostly unprotected, and popular apps and system services are vulnerable to man-in-the-middle attacks.