this post was submitted on 22 Mar 2025
3 points (100.0% liked)

Applied Paranoia

55 readers
1 users here now

Discussions of Paranoia, how to apply it in a digital ecosystem (Security, Privacy, Tools, Applications, Questions)

Rules

  1. Be nice
  2. Stay on topic
  3. Don’t farm rage
  4. Be respectful of others

founded 2 months ago
MODERATORS
 

During our previous research on Android File-Based encryption, we studied the boot chain of some Samsung devices based on Mediatek system on chips. Our objective was to exploit a known boot ROM vulnerability to bypass the secure boot and ultimately retrieve the required ingredients to brute force the user credentials. Once we became familiar with this boot chain, we decided to take a closer look at a component coming later in the process: the Little Kernel bootloader (LK, also called BL3-3)....

By: Maxime Rossi Bellom & Raphael Neveu Additional Contributors: Damiano Melotti & Gabrielle Viala

Full Abstract and Presentation Materials: blackhat.com/us-24/briefings/schedule/#attacking-samsung-galaxy-a-boot-chain-and-beyond-38526

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here