Skip to content

Commit c247608

Browse files
pascaljjeroenleenarts
authored andcommitted
Add Pascal for Samuel
Pascal will hold the "What Really Happens to Your iOS App During Compilation" talk.
1 parent 8dbfb17 commit c247608

File tree

4 files changed

+10
-11
lines changed

4 files changed

+10
-11
lines changed
14.1 KB
Loading
-142 KB
Binary file not shown.

src/content/agenda/2025-day1-talk4-samuel.md renamed to src/content/agenda/2025-day1-talk4-pascal.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,18 @@ title: "What Really Happens to Your iOS App During Compilation - and What it
33
Exposes"
44
date: "2025-11-12"
55
time: "13:15"
6-
name: "Samuel Hopstock"
7-
image: "/images/speakers/2025/samuel.webp"
6+
name: "Pascal Jungblut"
7+
image: "/images/speakers/2025/pascal.webp"
88
type: "Talk"
99
summary: "In this session we’ll dissect your .xcarchive and .ipa to show you exactly what Xcode does with your source code."
1010
---
1111

12-
We'll cover the compilation process, Mach‑O binaries, symbol tables, Info.plist, Obj-C/Swift metadata, resource catalogs, Apple signing and more. We’ll demonstrate how automated tools are used to reconstruct control flow and reveal sensitive data. Then, we show how attackers can replace or patch components inside the bundle, re‑sign it, and distribute a repackaged version. Finally, we’ll outline targeted techniques to make analysis and tampering of sensitive areas significantly harder .
12+
We'll cover the compilation process, Mach‑O binaries, symbol tables, Info.plist, Obj-C/Swift metadata, resource catalogs, Apple signing and more. We’ll demonstrate how automated tools are used to reconstruct control flow and reveal sensitive data. Then, we show how attackers can replace or patch components inside the bundle, re‑sign it, and distribute a repackaged version. Finally, we’ll outline targeted techniques to make analysis and tampering of sensitive areas significantly harder.
1313

14-
## Samuel Hopstock
14+
## Pascal Jungblut
1515

16-
Samuel Hopstock is a software engineer at Guardsquare, where he was one of the first engineers working on AppSweep, a mobile app security testing tool. Initially, he contributed to the Java bytecode analysis engine for Android apps. Since then he has shifted his focus to analyzing and protecting native iOS, Android, and Flutter binaries.
16+
Pascal Jungblut is a software engineer at Guardsquare, where his team works on the iOS analysis functions in AppSweep, a mobile app security testing tool, and iXGuard, compiler-based mobile app protection for iOS apps. After a period as a freelancer and the completion of his Ph.D., Pascal entered the field of mobile app security, focusing on the automatic detection of security issues in iOS and Flutter binaries. He has worked on static analysis of MachO binaries as well as the LLVM-based protection.
1717

18-
This talk is a sponsored by GuardSquare.
18+
This talk is a sponsored by Guardsquare.
1919

20-
<a href="http://www.guardsquare.com/?utm_source=sponsoring&utm_medium=conference&utm_campaign=do_ios_2025" target="_blank"><img src="/images/sponsors/2025/guardsquare.png" width= "250" /></a>
20+
<a href="http://www.guardsquare.com/?utm_source=sponsoring&utm_medium=conference&utm_campaign=do_ios_2025" target="_blank"><img src="/images/sponsors/2025/guardsquare.png" width= "250" /></a>

src/data/data-2025.json

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -52,9 +52,8 @@
5252
"xHandle": "sabapathytr7"
5353
},
5454
{
55-
"name": "Samuel Hopstock",
56-
"image": "/images/speakers/2025/samuel.webp",
57-
"xHandle": "Masrepus"
55+
"name": "Pascal Jungblut",
56+
"image": "/images/speakers/2025/pascal.webp"
5857
},
5958
{
6059
"name": "Pol Piella Abadia",
@@ -94,4 +93,4 @@
9493
}
9594
],
9695
"sponsors": []
97-
}
96+
}

0 commit comments

Comments
 (0)