In March 2020, Google patched a critical vulnerability affecting many MediaTek based devices. This vulnerability had been known by MediaTek since April 2019, and later exploited in the wild! In this post, we give some details about this vulnerability and see how we can use it to achieve kernel memory reads and writes.
more ...Third part of a blog post series about our approach to reverse engineer a Philips TriMedia based IP camera.
more ...In this second blog post of our series on Samsung's TrustZone, we present the various tools that we have developed during our research to help us reverse engineer and exploit Trusted Applications as well as Secure Drivers.
more ...In this first article of a series of three, we will give a tour of the different components of Samsung's TrustZone, explain how they work and how they interact with each other.
more ...Analysis of Tencent Legu: a packer for Android applications.
more ...A retrospective on the 3 past years of development and an introduction to the future of Irma, our File Analysis Solution.
more ...This blog post presents a vulnerability which affects the widely installed Android web browser.
more ...We will demonstrate how we can recover the password and memory content of RFID tags by carefully cutting the power source during EEPROM writes.
more ...