Explore >> Select a destination


You are here

www.riscure.com
| | comsecuris.com
1.6 parsecs away

Travel
| | [AI summary] This blog post discusses a detailed exploit chain targeting a mobile phone's application processor OS through a compromised modem. The author outlines the process of identifying vulnerabilities in the baseband firmware, reverse engineering the MT6795's cellular stack layers, and attempting to fuzz the MM layer for potential memory corruption issues. The post also touches on the challenges of creating a persistent rootkit via the modem and the importance of hardware isolation in securing mobile platforms.
| | blog.quarkslab.com
1.6 parsecs away

Travel
| | In this first article of a series of three, we will give a tour of the different components of Samsung's TrustZone, explain how they work and how they interact with each other.
| | blog.thalium.re
1.4 parsecs away

Travel
| | [AI summary] The provided text is a detailed technical analysis of a security vulnerability in the TEEgris secure kernel of a Samsung device, focusing on exploit development and reverse engineering techniques. It outlines the following key points:
| | mcyoung.xyz
21.2 parsecs away

Travel
| [AI summary] The article provides an in-depth exploration of computer architecture and assembly language, focusing on the RISC-V Instruction Set Architecture (ISA). It covers fundamental concepts such as machine words, registers, and the role of assembly language as a human-readable representation of machine instructions. The text explains how programs are structured using instructions, labels, and directives, and categorizes instructions into arithmetic, memory, control flow, and miscellaneous types. It also delves into the calling convention, which defines how functions are called and how data is passed between them, and highlights the importance of maintaining the call stack illusion. The article further discusses the practical implications of these conce...