Following our presentation at Black Hat USA, in this blog post we provide some details on CVE-2022-20233, the latest vulnerability we found on Titan M, and how we exploited it to obtain code execution on the chip.
more ...In this blog post, we present a new vulnerability dataset composed of thousands of vulnerabilities aimed at helping security practitioners to develop, test and enhance their tools. Unlike others, this dataset contains both the vulnerable and fixed states with source data.
more ...When analyzing an Android application, we often end up playing with the Smali intermediate representation... Way more human readable than the binary DEX code itself, but still not that user friendly. This blog post gives some guidelines on how to read Smali, and start writing you own Smali code!
more ...A quick introduction to Android Emuroot, a Python script that allows to get root privileges on the fly on an Android Virtual Device (AVD). It explains the reverse engineering steps needed for the script to work with recent AVDs and provides a preview of specific Linux kernel structures in memory.
more ...This blog post dives into how to get a better understanding of an Android native function by taking full advantage of both Frida and QBDI.
more ...Analysis of Tencent Legu: a packer for Android applications.
more ...This blog post presents a vulnerability which affects the widely installed Android web browser.
more ...This blog post deals with QBDI and how it can be used to reverse an Android JNI library
more ...This blog post is about detecting modifications between genuine and repackaged applications.
more ...This blog post is about examining an Android security patch and understanding how it mitigates the vulnerability.
more ...