Your locale preferences have been saved. We like to think that we have excellent support for English in pretalx, but if you encounter issues or errors, please contact us!

Demystify Mach-O
08-17, 09:30–10:15 (Europe/Berlin), Milliways
Language: English

A deep dive explaining the Mach-O executable format along side a code demo.


Apple systems can be quite obscure and archaic considering how popular and ubiquitous their devices are. Learning more about apple systems for any purpose therefore requires a healthy amount of reverse engineering. A core part of reverse engineering Apple systems is understanding the Mach-O file format which is how all Apple OSes describe executable files. This talk will provide an in depth explanation of the file format as well as a code example showing how we can parse Mach-O objects at runtime to show a loaded system libraries Obj-C class hierarchy.

A software engineer from Texas who works on the Intune MAM iOS SDK. Currently working on a Masters at UT Austin.