Apple ZeroConf Holes: How Hackers Can Steal Iphone Photos.

Xiaolong Bai,Luyi Xing,Nan Zhang,XiaoFeng Wang,Xiaojing Liao,Tongxin Li,Shi-Min Hu
DOI: https://doi.org/10.1109/msp.2017.23
IF: 3.105
2017-01-01
IEEE Security & Privacy
Abstract:Usability-oriented zero configuration (ZeroConf) designs, with automatic service discovery "plug-and-play" techniques, give rise to security implications. A study focusing on Apple--the major proponent of ZeroConf--brings to light a disturbing lack of security: major ZeroConf components are mostly unprotected, and popular apps and system services are vulnerable to man-in-the-middle attacks.
What problem does this paper attempt to address?