YoVDO

Exploitation of a Modern Smartphone Baseband

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Stack Overflows Courses Memory Corruption Courses

Course Description

Overview

Explore the intricacies of modern smartphone baseband security in this 41-minute Black Hat conference talk. Delve into the design and security countermeasures of smartphone basebands, learn techniques for identifying memory corruption bugs, and discover methods for exploiting vulnerabilities. Gain insights into the relationship between the Application Processor (AP) running the OS and apps, and the baseband running a Real-Time Operating System (RTOS). Examine radio technologies, CDMA network setup, and the process of hacking into the machine to reach vulnerable components. Witness the exploitation of a potential stack overflow in the baseband and understand vendor responses to such security issues.

Syllabus

Intro
Introduction And Related Work
The AP runs your OS and apps Android The Baseband runs a RTOS They communicate with
Radio technologies
Setting up a CDMA network
Hacking into the Machine
Reaching the vulnerable
Exploit a stack overflow(?) in baseband
Vendor Response


Taught by

Black Hat

Related Courses

Binder - The Bridge To Root - Hongli Han and Mingjian Zhou
Hack In The Box Security Conference via YouTube
JARVIS Never Saw It Coming - Hacking Machine Learning in Speech, Text and Face Recognition
44CON Information Security Conference via YouTube
SyScan360'16 Singapore - Memory Corruption Is For Wussies
SyScan360 via YouTube
Select Code Execution From Using SQLite
media.ccc.de via YouTube
BLEEDINGBIT - Your APs Belong to Us
Black Hat via YouTube