You are here |
googleprojectzero.blogspot.com | ||
| | | |
blog.quarkslab.com
|
|
| | | | Join us in our journey into modern Android's Data Encryption at rest, in which we study how it works and assess how resistant it is against attackers having access to a range of high end software vulnerabilities. | |
| | | |
www.huntandhackett.com
|
|
| | | | After months of dedicated research we cover a wide range of concealed code execution techniques and investigate their mechanisms and how to detect them. | |
| | | |
www.riscure.com
|
|
| | | | In this series of blog posts about Samsung's TEE OS we identify vulnerabilities in tee security and show how to exploit them. | |
| | | |
insinuator.net
|
|
| | This is a write-up about how to use Frida to dump documents from a process after they have been loaded and decrypted. It's a generic and very effective approach demonstrated on a piece of software from North Korea. Some time ago we received an ISO file which was a dump of a CD-ROM from North Korea. The only information we got was that it included a document viewer and various PDF docume ... |