Martijn Bogaard
@jmartijnb
Reverse engineers source code by day and reviews binaries by night. TEEs, TAs, bootloaders (Secure Boot), RTOSs, firmware blobs and other low-level sw.
ID: 48356444
18-06-2009 13:56:57
371 Tweet
977 Takipçi
1,1K Takip Edilen
"A lot of ROMs are open source, you just need an exploit" - Carlo Mara😂
Attacking Titan M with Only One Byte Code execution and exfiltration of encryption keys from Google Pixel phone's Secure Element now being presented by Damiano Melotti and Maxime Rossi Bellom at Black Hat #BHUSA Full details are now public in their blog post: blog.quarkslab.com/attacking-tita…
New writeup about an unlocked TSEG in the Acer Swift 3 model, resulting in full SMM access: labs.ioactive.com/2022/11/explor… You can verify if your system is properly locked with Platbox: github.com/IOActive/Platb… IOActive, Inc #Acer #SMM #AMD #firmware Krzysztof Okupski n3k droogie
Slide-deck of our talk at BH USA 2023 on attacking & securing Pixel modem are available at i.blackhat.com/BH-US-23/Prese… Farzan Karimi, Xuan & Xiling
We are looking forward to make Fault Injection art offensivecon ! 🥳 Pew Pew Pew!
A big honor to coauthor with abcSup and Gulshan the very first blog from Android Red Team on analysis and exploitation of CVE-2023-20938 in Android Binder driver at androidoffsec.withgoogle.com/posts/attackin… 🔥 The slide-deck presented at offensivecon is available at androidoffsec.withgoogle.com/posts/attackin…