YoVDO

Researching the Unisoc Baseband

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Cybersecurity Courses Reverse Engineering Courses Mobile Device Security Courses Fuzzing Courses Vulnerability Research Courses Firmware Security Courses

Course Description

Overview

Explore the first-ever security research on the Unisoc baseband in this 28-minute conference talk from Recon 2022. Dive into the process of reverse-engineering and fuzzing the NAS protocol implementation to uncover vulnerabilities that can disrupt radio communication in Unisoc-based devices. Learn about the history of Unisoc (formerly Spreadtrum), its market position as the fourth-largest smartphone chip manufacturer globally, and its popularity in Africa and Asia. Discover why this widely-used baseband has remained largely unstudied until now. Follow along as the speaker, Slava Makkaveev, a Security Researcher at Check Point Research, shares insights on researching the LTE protocol stack implementation and finding vulnerabilities that can block communications in Unisoc-powered smartphones.

Syllabus

Recon 2022 - Researching the Unisoc baseband


Taught by

Recon Conference

Related Courses

Cyber Security in Manufacturing
University at Buffalo via Coursera
Security Awareness Training
(ISC)² via Coursera
Masterclass - Hacking de dispositivos moviles
Udemy
Threat and Vulnerability Management for CompTIA CySA+
Pluralsight
Protecting Devices and Applications in Microsoft 365
Pluralsight