Главная
Study mode:
on
1
Intro
2
Introduction And Related Work
3
The AP runs your OS and apps Android The Baseband runs a RTOS They communicate with
4
Radio technologies
5
Setting up a CDMA network
6
Hacking into the Machine
7
Reaching the vulnerable
8
Exploit a stack overflow(?) in baseband
9
Vendor Response
Description:
Explore the intricacies of modern smartphone baseband security in this 41-minute Black Hat conference talk. Delve into the design and security countermeasures of smartphone basebands, learn techniques for identifying memory corruption bugs, and discover methods for exploiting vulnerabilities. Gain insights into the relationship between the Application Processor (AP) running the OS and apps, and the baseband running a Real-Time Operating System (RTOS). Examine radio technologies, CDMA network setup, and the process of hacking into the machine to reach vulnerable components. Witness the exploitation of a potential stack overflow in the baseband and understand vendor responses to such security issues.

Exploitation of a Modern Smartphone Baseband

Black Hat
Add to list
0:00 / 0:00