nsr

no such reference

nsr boosted:
2024-08-14

Our #usenix2024 paper "SIMurai: Slicing Through the Complexity of SIM Card Security Research" just went public!

We asked ourselves: What kind of attacks could a hostile SIM launch against your phone?

nsr boosted:
:verified: domenukdmnk@infosec.exchange
2023-08-18

See the recording of our baseband emulation and fuzzing talk here:
media.ccc.de/v/camp2023-57330-

#cccamp23

nsr boosted:
:verified: domenukdmnk@infosec.exchange
2023-08-14

Come see @nsr and me talk about smartphone baseband emulation and #fuzzing.

Learn how to use #FirmWire and find some bugs :)

Thursday morning, 10:30 at #cccamp23
pretalx.c3voc.de/camp2023/talk

nsr boosted:
2023-01-14

Disclosing CHOP, aka how attackers can bypass commodity return address protections such as stack cookies by hijacking the exception handling process. Paper to appear NDSS'23, fetch our preprint here: download.vusec.net/papers/chop! Joint work of Victor Duta, Fabian Freyer, @pagabuc, @nsr, and @c_giuffrida.

Code and data available at: github.com/chop-project/chop.

Interested in smashing stacks or binary exploitation in general? In case you attend Backhat Europe next week, feel free to checkout Victors's and Fabian's talk "Unwinding the Stack for Fun and Profit" next Wednesday.

They will present our work on confusing the unwinder and bending exception handling for exploitation.

More info at: blackhat.com/eu-22/briefings/s

nsr boosted:
jiska 🦄:fairydust:jiska@chaos.social
2022-11-21

Trying to use Twitter Spaces one last time while it's still running for the reverse engineering adventures. Tune in tomorrow at 8PM Berlin time. Tell us about the most expensive thing you bricked during security analysis and ask any question you want 💻 💥 📱

twitter.com/i/spaces/1mrGmkjlQ

Happy to announce the release of swSIM and swICC by Tomasz Lisowski, two open source repositories to enable SIM card emulation: github.com/tomasz-lisowski/swi & github.com/tomasz-lisowski/sws.

Among others, we attached the emulator to a physical phone via SIMTrace2 and interact with test networks!

Experimental setup containing of a desktop computer, two phones, a Simtrace2, a raspberry Pi, and a nuand BladeRF. One of the phones is connected to the Simtrace2.

Ohai!

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst