iG0x72 – Portfolio
Memoji of Igor Farias
OS SECURITY · RESEARCH

Igor Farias

iOS Security Researcher

I research Apple kernel security by reverse engineering kernel internals, analyzing sandbox and trust mechanisms, and building tooling around them. My work spans experimental research, open-source contributions, and production security pipelines.

iometa kernelcache tooling preview
Open-source

iometa

Fixed kernelcache parsing for iOS 15 and earlier. Debugged Mach-O fixup chains to restore compatibility.

Upstream patch · iOS kernel tooling
Exploit Research

CVE-2025-43534

Discovered a sandbox escape allowing controlled file writes outside intended containers. The vulnerability arises from trust boundary violations between Apple userland daemons.

Impact: A user with physical access to an iOS device may be able to bypass Activation Lock.
Description: A path handling issue was addressed with improved validation.

Arbitrary file write · sandbox model · iOS userland
Research Tooling

SBPL Viewer

  • SBPL parsing and normalization
  • Policy graph and inheritance mapping
  • Effective permission inspection
Kernel Research

KFD / PUAF Study

  • Physical UAF primitives (PUAF)
  • pmap, PPL, and VM internals
  • Kernel R/W primitive construction
Tooling

KnightWatch

Release integrity gate that validates IPA, XCARCHIVE, APK, and AAB artifacts across CI/CD. Enforces signing checks, metadata consistency, and tamper detection before ship.

IPA / XCARCHIVE / APK / AAB
Bsides Rio CTF recognition
Recognition

Bsides Rio CTF — 1st Place

2025 · reverse engineering & exploitation