Tag: Android

32 articles
Date Tue 04 August 2020
Author Tom Czayka
Category Android

This blog post dives into how to get a better understanding of an Android native function by taking full advantage of both Frida and QBDI.


This third article from the Samsung's TrustZone series details some vulnerabilities that were found and how they were exploited to obtain code execution in EL3.

Date Tue 24 March 2020
Author Maxime Rossi Bellom
Category Reverse-Engineering

In March 2020, Google patched a critical vulnerability affecting many MediaTek based devices. This vulnerability had been known by MediaTek since April 2019, and later exploited in the wild! In this post, we give some details about this vulnerability and see how we can use it to achieve kernel memory reads and writes.

Date Tue 17 December 2019
Authors Alexandre Adamski, Joffrey Guilbon, Maxime Peterlin
Category Reverse-Engineering

In this second blog post of our series on Samsung's TrustZone, we present the various tools that we have developed during our research to help us reverse engineer and exploit Trusted Applications as well as Secure Drivers.

Date Tue 10 December 2019
Authors Alexandre Adamski, Joffrey Guilbon, Maxime Peterlin
Category Reverse-Engineering

In this first article of a series of three, we will give a tour of the different components of Samsung's TrustZone, explain how they work and how they interact with each other.

Date Tue 26 November 2019
Author Romain Thomas
Category Android

Analysis of Tencent Legu: a packer for Android applications.

Date Thu 14 November 2019
Author Tom Czayka
Category Android

This blog post presents a vulnerability which affects the widely installed Android web browser.

Date Tue 10 September 2019
Author instrumentation-team
Category Programming

This blog post introduces the release of QBDI v0.7.0 as well as an Android use case.

Date Mon 03 June 2019
Author Romain Thomas
Category Android

This blog post deals with QBDI and how it can be used to reverse an Android JNI library

Date Thu 16 May 2019
Authors Tom Czayka, Romain Thomas
Category Android

This blog post is about detecting modifications between genuine and repackaged applications.