YoVDO

Scaling Up Baseband Attacks - More Unexpected Attack Surface

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Network Security Courses GPS Courses

Course Description

Overview

Explore the unexpected attack vectors in baseband processors of mobile phones in this Black Hat USA 2012 conference talk. Delve into the world of baseband attacks, moving beyond the assumption of physical proximity requirements. Discover how vulnerabilities in certain baseband stack components can be exploited remotely over IP connections, potentially affecting a large number of smartphones simultaneously. Learn about NAVSTAR GPS, GPS aiding, and SUPL (Secure User Plane Location) protocols, and their role in creating new attack surfaces. Examine the implementation of A-GPS on Android devices and the potential for abuse. Gain insights into Qualcomm's gpsOne technology and the baseband bugs found. Understand the implications of TCP/IP in the baseband and receive book recommendations for further study on this critical aspect of mobile security.

Syllabus

Intro
whoami
Overview
Baseband attacks
NAVSTAR GPS
More data transmitted
GPS basics
Standalone GPS
Challenges
GPS aiding
AGPS modes
Location requests
Advantages of SUPL
SUPL transports
SUPL V2
Privacy
Example SUPL flow
Implementations
SUPL servers
A-GPS on Android
Abusing SUPL
Android attack scenario
Locking it down tight
Smartphone anatomy
Qualcomm's gpsOne
Baseband bugs found
SUPL on the AP
Good news for defenders
General observations
TCP/IP in the baseband?
Book recommendations


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube