YoVDO

Beyond Android MTE: Navigating OEM's Logic Labyrinths

Offered By: OffensiveCon via YouTube

Tags

Mobile Security Courses ARM Architecture Courses Exploit Development Courses Vulnerability Research Courses Memory Corruption Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into the intricacies of Android Memory Tagging Extension (MTE) implementation across various Original Equipment Manufacturers (OEMs) in this 49-minute conference talk from OffensiveCon24. Explore the challenges and complexities introduced by OEMs' custom logic layered on top of Android's MTE, and gain insights into navigating these unique security implementations. Learn how different manufacturers approach memory safety, and understand the implications for security researchers and developers working with diverse Android devices. Uncover strategies for analyzing and potentially exploiting these custom MTE implementations, equipping yourself with valuable knowledge for mobile security assessments and vulnerability research.

Syllabus

OffensiveCon24 - Joffrey Guilbon, Max, Mateusz Fruba and Georgi Geshev


Taught by

OffensiveCon

Related Courses

Binder - The Bridge To Root - Hongli Han and Mingjian Zhou
Hack In The Box Security Conference via YouTube
JARVIS Never Saw It Coming - Hacking Machine Learning in Speech, Text and Face Recognition
44CON Information Security Conference via YouTube
SyScan360'16 Singapore - Memory Corruption Is For Wussies
SyScan360 via YouTube
Select Code Execution From Using SQLite
media.ccc.de via YouTube
BLEEDINGBIT - Your APs Belong to Us
Black Hat via YouTube