Главная
Study mode:
on
1
Intro
2
History of BlackBerry
3
UNIX
4
Objective
5
Previous work
6
Micro Kernel
7
Userspace demons
8
Finegrained permissions
9
Methodology
10
Exploit Mitigation
11
Memory Corruption
12
Other Similarities
13
Remote vectors
14
IP stack
15
Chipsets
16
Engineering Screens
17
Remote Lock Collection
18
Lip Forensics
19
Cryptographic protection
20
Token protection
21
Persistence
22
Blackberry Balance
23
Group IDs
24
Equip
25
Colonel
26
Encryption
27
QCon
28
Applications
Description:
Explore the security landscape of BlackBerryOS 10 in this 52-minute Black Hat USA 2013 conference talk by Ralf-Philipp Weinmann. Delve into the platform's architectural overhaul, including the adoption of QNX as the base operating system and the introduction of native code applications. Analyze the attack surface, examining methods for local privilege escalation and remote entry points. Investigate rootkit persistence techniques and evaluate the effectiveness of BlackBerry Balance in securely separating business data from personal applications. Gain insights into exploit mitigation, memory corruption, remote vectors, cryptographic protection, and the intricacies of BlackBerry's security features.

BlackBerryOS 10 from a Security Perspective

Black Hat
Add to list
0:00 / 0:00