Beyond Android MTE: Navigating OEM's Logic Labyrinths
Offered By: OffensiveCon via YouTube
Course Description
Overview
Dive into the intricacies of Android Memory Tagging Extension (MTE) implementation across various Original Equipment Manufacturers (OEMs) in this 49-minute conference talk from OffensiveCon24. Explore the challenges and complexities introduced by OEMs' custom logic layered on top of Android's MTE, and gain insights into navigating these unique security implementations. Learn how different manufacturers approach memory safety, and understand the implications for security researchers and developers working with diverse Android devices. Uncover strategies for analyzing and potentially exploiting these custom MTE implementations, equipping yourself with valuable knowledge for mobile security assessments and vulnerability research.
Syllabus
OffensiveCon24 - Joffrey Guilbon, Max, Mateusz Fruba and Georgi Geshev
Taught by
OffensiveCon
Related Courses
CNIT 127: Exploit DevelopmentCNIT - City College of San Francisco via Independent Reverse Engineering and Exploit Development
Udemy Penetration Testing: Advanced Kali Linux
LinkedIn Learning Linux x86 Assembly and Shellcoding
Udemy Python : Sıfırdan İleri Seviyeye - Etik Hacker Örnekleriyle
Udemy