Главная
Study mode:
on
1
Introduction
2
Research Goal
3
Research Methodology
4
Test PC Code
5
EP Message
6
Memory
7
Kernel Lock
8
Android to Audio DSP
9
Create Audio EP Message
10
Research
11
Audio DSP Image
12
RAM Partition
13
Tensilic Extensions
14
Disassembly
15
Object Dump
16
Audio Tasks
17
Android Kernel Lock
18
Task Audio Demon
19
Open Audio Buffer
20
What we have
21
Parameters
22
Program File
23
Summary
24
Questions
Description:
Explore the vulnerabilities in MediaTek's audio DSP firmware and Android API in this HITB Security Conference talk. Dive into the reverse engineering process of the custom Tensilica Xtensa microprocessor architecture used in MediaTek SoCs. Learn about the discovered security issues that could lead to local privilege escalation, eavesdropping on user conversations, and malicious code concealment. Gain insights into the unique challenges posed by MediaTek's custom instruction set and the research methodology employed to uncover these vulnerabilities. Understand the implications for the security of smartphones and IoT devices using MediaTek chips, which are present in approximately 37% of such devices worldwide.

Knockin' On MediaTek ADSP's Door

Hack In The Box Security Conference
Add to list