Project

General

Profile

AcademicPapersAndPresentations » History » Version 8

Denis 'GNUtoo' Carikli, 01/04/2021 04:22 PM
rename to academic papers *and presentations*

1 1 Denis 'GNUtoo' Carikli
{{toc}}
2 8 Denis 'GNUtoo' Carikli
3
h1. AcademicPapers and presentations
4 3 Denis 'GNUtoo' Carikli
5 1 Denis 'GNUtoo' Carikli
h2. Forensics acquisition - Analysis and circumvention of samsung secure boot enforced common criteria mode
6
7
Link: https://www.sciencedirect.com/science/article/pii/S1742287618300409
8 6 Denis 'GNUtoo' Carikli
file name: 1-s2.0-S1742287618300409-main.pdf
9 1 Denis 'GNUtoo' Carikli
License: CC BY-NC-ND
10
11
h3. Description:
12
13
While this paper directly applies to the Galaxy S6 (SM-G920F) and the Galaxy S7 Edge (SM-G935F) witch uses Exynos System On a Chip, some of its findings seem to be directly applicable to the devices supported by Replicant.
14
15
The most interesting part is the analysis of some of the bootloader environment variables:
16
* It analyzes some variables that accessible through the UART. We already have "documentation explained how to access such variables":https://redmine.replicant.us/projects/replicant/wiki/MidasBootloader#Changing-the-kernel-commandline-arguments but many variables aren't documented in the Replicant documentation.
17
* It also analyzed some variables present in the adv-env.img file inside the PARAM tarball filesystem. That information has already been used in the #2094 bug.
18 2 Denis 'GNUtoo' Carikli
19
h2. Security Analysis of Android Factory Resets
20
21 1 Denis 'GNUtoo' Carikli
Link: https://www.cl.cam.ac.uk/~rja14/Papers/fr_most15.pdf
22 4 Denis 'GNUtoo' Carikli
Related bug reports: #2096
23 7 Denis 'GNUtoo' Carikli
24
h2. A walk with Shannon. Walkthrough of a pwn2own baseband exploit.
25
26
Presentation pdf: https://downloads.immunityinc.com/infiltrate2018-slidepacks/amat-cama-a-walk-with-shannon/presentation.pdf
27
Presentation Video: https://www.youtube.com/watch?v=6bpxrfB9ioo
28
Target device: unclear, Maybe a Galaxy S6 or Galaxy S8
29
30
h3. Description
31
32
The device used has shared memory between the SOC running Android and the modem.
33
34
There are some interesting points in that presentation:
35
* Getting code execution in the modem is easy and there are no protection (everything runs with full privileges, no exploit mitigations)
36
* There is a SYSDUMP menu in the stock distribution that is available when dialing *#9900#. That menu can get modem logs, memory dumps, etc.
37
* The bootloader is actually involved in getting the modem memory dump
38
* On that device the modem image is encrypted (In contrast, it's probably not encrypted on devices like the Galaxy SIII)
39
* The demo uses the same technique described by the [[SamsungGalaxyBackdoor]].
40
* The presentation also has many information on the setup needed to do the research: which SDR and cellular telephony stacks could be used. In turn this could be useful if we want to do our own research, for instance to see what happen when the modem is in airplane mode, and so on.