|
You are here |
github.blog | ||
| | | | |
www.trailofbits.com
|
|
| | | | | [AI summary] The text discusses the security considerations for using AWS Nitro Enclaves, covering topics such as secure randomness, side-channel attacks, memory management, and time sources. It emphasizes the importance of proper configuration and mitigation strategies to protect against potential vulnerabilities. | |
| | | | |
securitylab.github.com
|
|
| | | | | Use-after-free in the Arm Mali GPU kernel driver | |
| | | | |
comsecuris.com
|
|
| | | | | [AI summary] This blog post discusses a detailed exploit chain targeting a mobile phone's application processor OS through a compromised modem. The author outlines the process of identifying vulnerabilities in the baseband firmware, reverse engineering the MT6795's cellular stack layers, and attempting to fuzz the MM layer for potential memory corruption issues. The post also touches on the challenges of creating a persistent rootkit via the modem and the importance of hardware isolation in securing mobile platforms. | |
| | | | |
gist.github.com
|
|
| | | GitHub Gist: instantly share code, notes, and snippets. | ||