Emulating Samsung's Baseband for Security Testing

Emulating Samsung's Baseband for Security Testing

Black Hat via YouTube Direct link

Fuzzing

27 of 42

27 of 42

Fuzzing

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Emulating Samsung's Baseband for Security Testing

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 About me
  3. 3 Agenda
  4. 4 What is a Baseband
  5. 5 Why Basebands
  6. 6 Samsung Baseband
  7. 7 Baseband Emulator
  8. 8 How did we get here
  9. 9 Crashes
  10. 10 Root
  11. 11 Debugging
  12. 12 Scaling
  13. 13 Reverse Engineering
  14. 14 Boot modes
  15. 15 Samsung kernel
  16. 16 Memory structure
  17. 17 Block diagram
  18. 18 Next step
  19. 19 Choosing a framework
  20. 20 Boot UART
  21. 21 UART debugging
  22. 22 Snapshots
  23. 23 The Problem
  24. 24 PiPanda
  25. 25 PAL
  26. 26 The Banner
  27. 27 Fuzzing
  28. 28 Triforce AFL
  29. 29 Target AFL Tasks
  30. 30 GSM Session Management
  31. 31 Fuzz Single
  32. 32 Demo
  33. 33 Rediscovery
  34. 34 Call of Death
  35. 35 Experimental Setup
  36. 36 Calling Demo
  37. 37 Logcat
  38. 38 Wrap Up
  39. 39 Future Work
  40. 40 Release Schedule
  41. 41 Thank You
  42. 42 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.