Главная
Study mode:
on
1
Intro
2
whoami
3
Overview
4
Baseband attacks
5
NAVSTAR GPS
6
More data transmitted
7
GPS basics
8
Standalone GPS
9
Challenges
10
GPS aiding
11
AGPS modes
12
Location requests
13
Advantages of SUPL
14
SUPL transports
15
SUPL V2
16
Privacy
17
Example SUPL flow
18
Implementations
19
SUPL servers
20
A-GPS on Android
21
Abusing SUPL
22
Android attack scenario
23
Locking it down tight
24
Smartphone anatomy
25
Qualcomm's gpsOne
26
Baseband bugs found
27
SUPL on the AP
28
Good news for defenders
29
General observations
30
TCP/IP in the baseband?
31
Book recommendations
Description:
Explore the unexpected attack vectors in baseband processors of mobile phones in this Black Hat USA 2012 conference talk. Delve into the world of baseband attacks, moving beyond the assumption of physical proximity requirements. Discover how vulnerabilities in certain baseband stack components can be exploited remotely over IP connections, potentially affecting a large number of smartphones simultaneously. Learn about NAVSTAR GPS, GPS aiding, and SUPL (Secure User Plane Location) protocols, and their role in creating new attack surfaces. Examine the implementation of A-GPS on Android devices and the potential for abuse. Gain insights into Qualcomm's gpsOne technology and the baseband bugs found. Understand the implications of TCP/IP in the baseband and receive book recommendations for further study on this critical aspect of mobile security.

Scaling Up Baseband Attacks - More Unexpected Attack Surface

Black Hat
Add to list