YoVDO

Researching the Unisoc Baseband

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Cybersecurity Courses Reverse Engineering Courses Mobile Device Security Courses Fuzzing Courses Vulnerability Research Courses Firmware Security Courses

Course Description

Overview

Explore the first-ever security research on the Unisoc baseband in this 28-minute conference talk from Recon 2022. Dive into the process of reverse-engineering and fuzzing the NAS protocol implementation to uncover vulnerabilities that can disrupt radio communication in Unisoc-based devices. Learn about the history of Unisoc (formerly Spreadtrum), its market position as the fourth-largest smartphone chip manufacturer globally, and its popularity in Africa and Asia. Discover why this widely-used baseband has remained largely unstudied until now. Follow along as the speaker, Slava Makkaveev, a Security Researcher at Check Point Research, shares insights on researching the LTE protocol stack implementation and finding vulnerabilities that can block communications in Unisoc-powered smartphones.

Syllabus

Recon 2022 - Researching the Unisoc baseband


Taught by

Recon Conference

Related Courses

Advanced White Hat Hacking & Penetration Testing Tutorial
Udemy
Practical Buffer Overflows for OSCP
Udemy
Buffer Overflows Made Easy
Cyber Mentor via YouTube
Burp Suite
David Bombal via YouTube
Buffer Overflows Made Easy - 2022 Edition
Cyber Mentor via YouTube