YoVDO

Researching the Unisoc Baseband

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Cybersecurity Courses Reverse Engineering Courses Mobile Device Security Courses Fuzzing Courses Vulnerability Research Courses Firmware Security Courses

Course Description

Overview

Explore the first-ever security research on the Unisoc baseband in this 28-minute conference talk from Recon 2022. Dive into the process of reverse-engineering and fuzzing the NAS protocol implementation to uncover vulnerabilities that can disrupt radio communication in Unisoc-based devices. Learn about the history of Unisoc (formerly Spreadtrum), its market position as the fourth-largest smartphone chip manufacturer globally, and its popularity in Africa and Asia. Discover why this widely-used baseband has remained largely unstudied until now. Follow along as the speaker, Slava Makkaveev, a Security Researcher at Check Point Research, shares insights on researching the LTE protocol stack implementation and finding vulnerabilities that can block communications in Unisoc-powered smartphones.

Syllabus

Recon 2022 - Researching the Unisoc baseband


Taught by

Recon Conference

Related Courses

Harnessing Intel Processor Trace on Windows for Fuzz
Recon Conference via YouTube
Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube
Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube
DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube
Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube