Publications
!CVE: A New Platform for Unacknowledged Cybersecurity !Vulnerabilities
During our hands-on presentation at Black Hat Europe 2023 in
the Arsenal, we'll introduce the latest advancements of the
NotCVE initiative. This project is dedicated to addressing the
significant challenge of security vulnerabilities overlooked
by vendors. NotCVE platform
provides an integrated, high-speed search function for both
NotCVE and standard CVE listings. Discover more about these
recent updates at https://notcve.org
!CVE: A New Platform for Unacknowledged Cybersecurity !Vulnerabilities
In this talk we present the !CVE initiative at DeepSec 2023!
This initiative tackles the critical issue of security
vulnerabilities that vendors are not recognising. With !CVE,
you'll find a centralized platform to identify, monitor, and
share these unaddressed security issues. Plus, you can
seamlessly search for both !CVE and standard CVE listings
through our lightning-fast search engine. Learn more at
https://notcve.org
Vlind Glitch: A Blind VCC Glitching Technique to Bypass the Secure Boot of the Qualcomm MSM8916 Mobile SoC
In this talk, presented December 7 at BlackHat Europe 2022, we introduced a Secure Boot bypass technique using voltage fault injection that does not require source code, binary code nor reverse engineering in order to succeed. In fact, our technique can be used on scenarios where no vulnerabilities are known in the BootROM. This technique can be applied to a broad variety of devices and smartphones, and was demonstrated on a Dragon Board 410c.
Auditing Closed Source Trusted Applications for Qualcomm Secure Execution Environment (QSEE)
This talk was presented November 17 at DeepSec 2022. We shared the knowledge we obtained from a careful reverse engineering examination of different QSEE Trusted Applications and operating systems (QSEE-OS). Besides, we presented the different tools we have developed throughout our research to assist in the security evaluation of QSEE, including a debugger for QSEE Trusted Applications fully integrated with GDB and Ghidra and a coverage-based fuzzer for QSEE Trusted Applications. Such tools are essential for us to better understand the internals and behaviour of the trusted applications, to find attack surfaces and to identify vulnerable code for further analyzing and fuzzing.