YoVDO

Beyond Android MTE: Navigating OEM's Logic Labyrinths

Offered By: OffensiveCon via YouTube

Tags

Mobile Security Courses ARM Architecture Courses Exploit Development Courses Vulnerability Research Courses Memory Corruption Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into the intricacies of Android Memory Tagging Extension (MTE) implementation across various Original Equipment Manufacturers (OEMs) in this 49-minute conference talk from OffensiveCon24. Explore the challenges and complexities introduced by OEMs' custom logic layered on top of Android's MTE, and gain insights into navigating these unique security implementations. Learn how different manufacturers approach memory safety, and understand the implications for security researchers and developers working with diverse Android devices. Uncover strategies for analyzing and potentially exploiting these custom MTE implementations, equipping yourself with valuable knowledge for mobile security assessments and vulnerability research.

Syllabus

OffensiveCon24 - Joffrey Guilbon, Max, Mateusz Fruba and Georgi Geshev


Taught by

OffensiveCon

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Reverse Engineering and Exploit Development
Udemy
Penetration Testing: Advanced Kali Linux
LinkedIn Learning
Linux x86 Assembly and Shellcoding
Udemy
Python : Sıfırdan İleri Seviyeye - Etik Hacker Örnekleriyle
Udemy