Tag: reverse engineering

58 articles
Date Thu 04 March 2021
Author Eric Le Guevel
Category Android

A quick introduction to Android Emuroot, a Python script that allows to get root privileges on the fly on an Android Virtual Device (AVD). It explains the reverse engineering steps needed for the script to work with recent AVDs and provides a preview of specific Linux kernel structures in memory.

Date Thu 12 November 2020
Author Francisco Falcon
Category Reverse-Engineering

Microsoft is currently working on Xtended Flow Guard (XFG), an evolved version of Control Flow Guard (CFG), their own control flow integrity implementation. XFG works by restricting indirect control flow transfers based on type-based hashes of function prototypes. This blog post is a deep dive into how the MSVC compiler generates those XFG function prototype hashes.

Date Thu 10 September 2020
Author Nahuel Riva
Category Hardware

A blog post about the security implemented in the August Smart Lock, with special focus on the Bluetooth Low Energy capabilities.


This third article from the Samsung's TrustZone series details some vulnerabilities that were found and how they were exploited to obtain code execution in EL3.

Date Tue 24 March 2020
Author Maxime Rossi Bellom
Category Reverse-Engineering

In March 2020, Google patched a critical vulnerability affecting many MediaTek based devices. This vulnerability had been known by MediaTek since April 2019, and later exploited in the wild! In this post, we give some details about this vulnerability and see how we can use it to achieve kernel memory reads and writes.

Date Thu 16 January 2020
Author Nahuel Riva
Category Hardware

Third part of a blog post series about our approach to reverse engineer a Philips TriMedia based IP camera.

Date Tue 17 December 2019
Authors Alexandre Adamski, Joffrey Guilbon, Maxime Peterlin
Category Reverse-Engineering

In this second blog post of our series on Samsung's TrustZone, we present the various tools that we have developed during our research to help us reverse engineer and exploit Trusted Applications as well as Secure Drivers.

Date Tue 10 December 2019
Authors Alexandre Adamski, Joffrey Guilbon, Maxime Peterlin
Category Reverse-Engineering

In this first article of a series of three, we will give a tour of the different components of Samsung's TrustZone, explain how they work and how they interact with each other.

Date Tue 26 November 2019
Author Romain Thomas
Category Android

Analysis of Tencent Legu: a packer for Android applications.