In mid 2012 we received an email from several folks in Japan asking us if we intended to bring our “ARM Exploitation” course from Blackhat Las Vegas 2012 to Asia. We had originally planned to do our class elsewhere in Asia but our work schedules conflicted pretty dramatically and we were unable to make it happen. But Japan in the New Year […]
In October (on the heels of our recent ARM Exploitation Research) we were invited to speak at ARMTechCon, one of the largest Microprocessor conferences in the world. It was held at Santa Clara Convention Center in California. We were asked to speak there and sit on an “expert panel” on the security of “Real-World” devices. […]
We spoke at Breakpoint 2012 in Melbourne, Australia. Whatta cool con. A researcher’s conference. It was small and highly relevant with great content. It was also a really great choice of venue (The Intercontinental). For the last decade or so I’ve used the term “rux” like people use the term “0wn”. I’ve also used the […]
About a month ago we gave a high-level talk about the threats to mobile devices at Source Seattle 2012. We talked (in the “Business Track”) about our experience developing the Practical ARM Exploitation course and also spoke anecdotally about our experiences reverse engineering and exploiting software on mobile devices and embedded systems. The talk was […]
“The sky above Las Vegas was the color of television, tuned to a dead channel…“ Ok it wasn’t. In fact it was bright, beautiful, sunny and hot as sh*t. Neal Stephenson did the keynote at BlackHat this year, so we felt we should sling the obligatory cyberpunk reference into this post….and because I (Ridley) am writing […]
Following our Blackhat 2012 training and talk we received a bunch of emails, tweets, and IMs asking one thing: “When are you going to offer this to the public again? I couldn’t make it to the BlackHat course.” With the exception of CanSecWest and BlackHat we’ve mostly been giving this (and customized versions of similar […]
Following our talk at Blackhat 2012 entitled “Practical ARM Exploitation”, we were honored to be asked to participate in a BlackHat press conference. After getting briefed by the Media Coordinator and Vincenzo Iozzo we summarized our talk and training in the simplest of terms to a room of reporters and journalists. After the press conference […]
Uhm….so apparently CTFs have REALLY blown up! As a founding member of Kenshoto, I remember how we pushed the envelope for CTFs (building automatic scoring systems, *actual* challenges, etc.) I was also the VJ for our first two years running, lugging my 500 DVDs with me to play my favorite little esoteric cyberpunk clips from […]
Another conference has come and gone. Sometimes it seems that the annual conference schedule is the metronome to which the Infosec world paces itself. The coming and going of conferences is the only consistency in this idiosyncratic industry full of neurosis and theatrics. This year’s CanSecWest held true to form and was the stage for […]
As we have announced in other blogposts we’ve been researching mobile platforms quite a bit (specifically those that use the ARM microprocessor). We compiled all of our notes on ARM reverse engineering and ARM exploitation and built a course called “Practical ARM Exploitation” that we will be publicly debuting this coming week at CanSecWest. The […]
February 3, 2013
by s7ephen
1