Date Tue 29 August 2023
Author Carlo Ramponi
Category Reverse-Engineering

This blog post presents an overview of Starlink's User Terminal runtime internals, focusing on the communications that happen within the device and with user applications and some tools that can help further research on the same topic.

Date Mon 21 August 2023
Authors Sami Babigeon, Benoît Forgette
Category Vulnerability

In this blog post, we present a new vulnerability on the Gecko Bootloader from Silicon Labs more precisely inside the OTA parser.

Date Mon 14 August 2023
Authors Maxime Rossi Bellom, Damiano Melotti
Category Android

Join us in our journey into modern Android's Data Encryption at rest, in which we study how it works and assess how resistant it is against attackers having access to a range of high end software vulnerabilities.

Date Fri 23 June 2023
Author Gwaby
Category Exploitation

In this blog post we'll see a technique to gain code execution in SMM from a very limited write primitive.

Date Tue 13 June 2023
Authors Dahmun Goudarzi, Damien Aumaitre, Ramtine Tofighi Shirazi
Category Software

Mithril Security engaged a collaboration with Quarkslab to perform an audit of the BlindAI-preview, now known as BlindAI Core, which is an open-source confidential computing solution for querying and deploying AI models while guaranteeing data privacy. The goal of the audit was to evaluate the BlindAI resiliency based on the definition of a threat model after a refresh on the latest state-of-the-art.

Date Wed 17 May 2023
Authors Robin David, Christian Heitman
Category Fuzzing

In this blog post we present PASTIS, a Python framework for ensemble fuzzing, developed at Quarkslab.

Date Tue 02 May 2023
Authors Robin David, Christian Heitman
Category Program Analysis

We present TritonDSE, a new tool by Quarkslab. TritonDSE is a Python library, built on top of Triton, that provides easy and customizable Dynamic Symbolic Execution capabilities for binary programs.

Date Thu 27 April 2023
Author Eric Le Guevel
Category Android

This article is about greybox fuzzing of userland targets that can be encountered in Android using AFL++ and its Frida mode. We also discuss how to target JNI functions, to test the native features invoked by Java code.

Date Fri 31 March 2023
Authors Sébastien Rolland, Mahé Tardy
Category Vulnerability

This article provides a brief overview of how Microsoft Open Management Infrastructure (OMI) works, as well as two vulnerabilities that the Quarkslab Cloud team identified through fuzzing techniques.

Date Fri 24 March 2023
Authors Eloïse Brocas, Damien Cauquil, Robin David, Benoît Forgette
Category Vulnerability

A journey into the Pwn2Own contest. Part 1: Netgear RAX30 router WAN vulnerabilities