Categories

30C3 Video: Hardware attacks, advanced ARM exploitation, and Android hacking

Posted on Monday, January 6th, 2014 in Android, ARM, hacks, Videos by the machinegeek


Stephen A. Ridley gave this presentation at the recently concluded Chaos Communications Conference (30C3) in Hamburg, Germany. He outlines his recent research into practical ARM exploitation on Linux and Android (for embedded applications and mobile devices). He demonstrates these techniques and discusses how they were discovered using several custom built ARM hardware development platforms.

He also discusses related hardware research including bus protocol eavesdropping/reverse engineering, demystifying hardware debugging, and surreptitiously obtaining embedded software (firmware) using hardware techniques.

Stephen is co-author of the soon-to-be-released “Android Hackers Handbook”.

This entry was posted on Monday, January 6th, 2014 at 12:16 am and is filed under Android, ARM, hacks, Videos. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • Joe Desbonnet: Ya, I can recommend the low melting point solder. I used brand 'ChipQuik' and it's amazingly easy to use.
  • Jerome: I need a new BusPirate for the Fablab ;) Many thanks!
  • Max: Seems like an unexpectedly violent way to remove the chip indeed. A hot air station should of course do the job just fine, but in...
  • jose: Part removal described here is pure butchery, the cheapest hot air station will do a fast and clean job removing the QFP, heat air to...
  • Cody: Yes please