Explore >> Select a destination


You are here

github.blog
| | comsecuris.com
3.3 parsecs away

Travel
| | [AI summary] This blog post discusses a detailed exploit chain targeting a mobile phone's application processor OS through a compromised modem. The author outlines the process of identifying vulnerabilities in the baseband firmware, reverse engineering the MT6795's cellular stack layers, and attempting to fuzz the MM layer for potential memory corruption issues. The post also touches on the challenges of creating a persistent rootkit via the modem and the importance of hardware isolation in securing mobile platforms.
| | securitylab.github.com
0.7 parsecs away

Travel
| | Improper validation of input data can lead to freed memory being accessible from the GPU, which can lead to arbitrary memory access.
| | blog.frizk.net
3.6 parsecs away

Travel
| | Did you think Meltdown was bad? Unprivileged applications being able to read kernel memory at speeds possibly as high as megabytes per seco...
| | github.com
5.8 parsecs away

Travel
| Marketing website for. Contribute to marcamillion/5KMVP development by creating an account on GitHub.