Skip to content
Nullcon Berlin

Breaking Apple's Core File APIs With Race Conditions


Course
Upgrade subscription below

Mickey Jin breaks down a race-condition vulnerability Apple once deemed unexploitable, showing how it enabled sandbox escapes and TCC bypasses, why early patches failed, and what finally worked.

As operating systems depend on shared system libraries to handle routine tasks, small defects in these foundations can have far-reaching security consequences. File manipulation functions are embedded deep within platform workflows and are routinely invoked by high-privilege processes, where incorrect assumptions about link handling and execution order can quietly expand the attack surface. Timing flaws that appear impractical on paper can become dependable when abused at scale.

Building resilient platforms requires grounding design and patching decisions in how attackers actually behave. Incomplete fixes and narrow threat models can leave core protections, such as sandboxing and privacy controls, exposed long after a vulnerability is acknowledged.

In this insightful session, independent Security Researcher Mickey Jin will discuss:

  • How race conditions in low-level file APIs propagate risk across Apple platforms;
  • How repeated execution turns fragile timing gaps into reliable exploits;
  • What robust mitigation looks like when fixing widely deployed, privilege-sensitive code.
 

 

Here is the course outline:

Exploiting the Impossible: Breaking Apple's Core File APIs With Race Conditions

Completion

The following certificates are awarded when the course is completed:

CPE Credit Certificate

Floating Button