09.08.2015 Views

Wendell Crenshaw Technologies presents

Outline

Outline

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Baseband (in)security• Code base created in the 1990s…• … with a 1990s attitude towards security• Network elements are considered trusted• Both GSM and UMTS protocols have many,many length fields• (Almost) no exploit mitigations[one counter-example: XMM6180 on iPhone4has hardware DEP enabled]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!