Impalabs

19 posts

Impalabs banner
Impalabs

Impalabs

@the_impalabs

Research-oriented security company @[email protected]

France Katılım Nisan 2021
2 Takip Edilen741 Takipçiler
Impalabs
Impalabs@the_impalabs·
All the advisories, including those for the other trusted applications, can be found on our blog: ⚠️ #advisories" target="_blank" rel="nofollow noopener">blog.impalabs.com/#advisories
English
1
0
3
837
Impalabs
Impalabs@the_impalabs·
After a bit of delay, we're finally releasing advisories for 139 vulnerabilities we found in 23 trustlets used on Huawei mobile devices. Some of them can be exploited to access the Secure World and retrieve sensitive data. 🧵 A thread of our most interesting findings
Impalabs tweet media
English
1
54
105
20.4K
Impalabs
Impalabs@the_impalabs·
Our newest advisory is about the Secure Monitor, a component of Huawei's TrustZone. It details 3 vulnerabilities (CVE-2021-39994, CVE-2021-22437, CVE-2021-39993) that we exploited to execute code at EL3, the highest privilege level of Android devices. blog.impalabs.com/2212_advisory_…
English
1
36
72
0
Impalabs
Impalabs@the_impalabs·
If you've missed our talk at @hexacon_fr, the recording of “Hara-Kirin: Dissecting Huawei Mobile Devices” is now available! Come with us for a guided tour of Huawei's Hypervisor and TrustZone, and learn about the cool bugs we discovered along the way. youtu.be/LxoHSrrGaNA
YouTube video
YouTube
English
0
22
59
0
Impalabs
Impalabs@the_impalabs·
Here are the slides of our @hexacon_fr talk about breaking the privileged components of Huawei's mobile devices. Thanks to everyone who attended, we hoped you liked it, and stay tuned for the upcoming blog posts! github.com/Impalabs/confe…
Impalabs tweet media
English
1
36
62
0
Impalabs retweetledi
Hexacon
Hexacon@hexacon_fr·
📱 Hara-Kirin: Dissecting the privileged components of Huawei mobile devices by Maxime Peterlin (@lyte__) and Alexandre Adamski (@NeatMonster_)
Hexacon tweet media
Română
0
16
34
0
Impalabs
Impalabs@the_impalabs·
Here is a follow-up blogpost detailing how we attacked Samsung RKP. We reveal 3 vulnerabilities we have used to compromise the security hypervisor and its assurances. We also explain our exploitation paths and look at the patches released by Samsung. blog.impalabs.com/2111_attacking…
English
0
41
55
0
Impalabs
Impalabs@the_impalabs·
Here's a short follow-up to our presentation on exploiting Samsung's Neural Processing Unit. This blogpost explains how we got control of the NPU, before using it as a foothold to attack the Android kernel. blog.impalabs.com/2110_exploitin…
English
0
18
43
0
Impalabs
Impalabs@the_impalabs·
Our security research blog is live! Stay tuned for our upcoming articles about reverse engineering, vulnerability research and exploit development. blog.impalabs.com
English
0
9
12
0