Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security landscape of BlackBerryOS 10 in this 52-minute Black Hat USA 2013 conference talk by Ralf-Philipp Weinmann. Delve into the platform's architectural overhaul, including the adoption of QNX as the base operating system and the introduction of native code applications. Analyze the attack surface, examining methods for local privilege escalation and remote entry points. Investigate rootkit persistence techniques and evaluate the effectiveness of BlackBerry Balance in securely separating business data from personal applications. Gain insights into exploit mitigation, memory corruption, remote vectors, cryptographic protection, and the intricacies of BlackBerry's security features.
Syllabus
Intro
History of BlackBerry
UNIX
Objective
Previous work
Micro Kernel
Userspace demons
Finegrained permissions
Methodology
Exploit Mitigation
Memory Corruption
Other Similarities
Remote vectors
IP stack
Chipsets
Engineering Screens
Remote Lock Collection
Lip Forensics
Cryptographic protection
Token protection
Persistence
Blackberry Balance
Group IDs
Equip
Colonel
Encryption
QCon
Applications
Taught by
Black Hat