Explore >> Select a destination


You are here

googleprojectzero.blogspot.com
| | blog.quarkslab.com
12.8 parsecs away

Travel
| | Join us in our journey into modern Android's Data Encryption at rest, in which we study how it works and assess how resistant it is against attackers having access to a range of high end software vulnerabilities.
| | www.huntandhackett.com
13.6 parsecs away

Travel
| | After months of dedicated research we cover a wide range of concealed code execution techniques and investigate their mechanisms and how to detect them.
| | www.riscure.com
11.1 parsecs away

Travel
| | In this series of blog posts about Samsung's TEE OS we identify vulnerabilities in tee security and show how to exploit them.
| | insinuator.net
85.5 parsecs away

Travel
| This is a write-up about how to use Frida to dump documents from a process after they have been loaded and decrypted. It's a generic and very effective approach demonstrated on a piece of software from North Korea. Some time ago we received an ISO file which was a dump of a CD-ROM from North Korea. The only information we got was that it included a document viewer and various PDF docume ...