Are you over 18 and want to see adult content?
More Annotations
A complete backup of empoweryoganj.com
Are you over 18 and want to see adult content?
A complete backup of oconnorscatholicsupply.com
Are you over 18 and want to see adult content?
A complete backup of getpurebloom.com
Are you over 18 and want to see adult content?
A complete backup of mandevilletrailheadmarket.com
Are you over 18 and want to see adult content?
A complete backup of hindibanker.blogspot.com
Are you over 18 and want to see adult content?
A complete backup of lebensweisheiten-sprueche.ch
Are you over 18 and want to see adult content?
Favourite Annotations
A complete backup of mcelroymetal.com
Are you over 18 and want to see adult content?
A complete backup of barterbooks.co.uk
Are you over 18 and want to see adult content?
A complete backup of copyright.org.au
Are you over 18 and want to see adult content?
A complete backup of pozisyonpenalti.com
Are you over 18 and want to see adult content?
Text
Research.
MULLINER.ORG : ANDROID STUFF AND SECURITY RESEARCHCONTACTANDROID RELATED WEBLOG ENTRIES Android Stuff and Security Research Android related weblog entries. Security Research. SafetyNet Attestation. Slides: 44con ekoparty mod odex code on github. Study on Android In-App billing security paper: VirtualSwindle Android Security - the third party slides PatchDroid: Scalable Third-Party Security Patches for Android Devices more details and paper here: PatchDroid.com PUBLIC RESEARCH TAC DATABASE Public Research TAC Database. This is my attempt to build a TAC (Type Allocation Code) database for research purposes. I do this because there are no public databases that I can use for my research. There are existing databases such as nobbi.com, radioraiders, NokiaPort (a Nokia only TAC database), imei-number.com but they all just allow toquery the database.
BINTEGRITY - MULLINER.ORG BINtegrity is practical, and restricts the ability of attackers to exploit generic memory corruption vulnerabilities in COTS binaries. In contrast to other approaches, BINtegrity does not require access to source code, binary modification, or application specific configuration such as policies. Our evaluation demonstrates thatBINtegrity incurs
HID ATTACK - MULLINER.ORG HID is independent from Bluetooth and is also used for USB devices, of course it was used for USB long before Bluetooth even existed. The Bluetooth SIG just specified a small wrapper protocol to transport HID over Bluetooth. The described attack will basically hijack the system keyboard of a computer. INSIDE ANDROID’S SAFETYNET @COLLINRM ATTESTATION WWW Collin Mulliner 44con London, U.K. Sept 2017 About Me Mobile App development since 1997 (for PalmOS) Mobile Security since 1998 2001(hard to tell)
XKBD-BTHID : A SOFTWARE BLUETOOTH HID KEYBOARD xkbd-bthid is a Bluetooth HID Keyboard in software, meaning this is an application which emulates a Bluetooth Keyboard. I call it soft-HID. What could you use it for? You can turn any Linux box, PDA or tablet into Bluetooth keyboard and control your DVR, MP3 player or what ever with it. xkbd-bthid running on the Nokia770. Features. SMS-BASED ONE-TIME PASSWORDS: ATTACKS AND DEFENSE SMS-Based One-Time Passwords: Attacks and Defense (Short Paper) CollinMulliner1,RavishankarBorgaonkar2, PatrickStewin 2,andJean-PierreSeifert 1 NortheasternUniversity crm@ccs.neu.edu 2 TechnischeUniversit¨atBerlin {ravii,patrickx,jpseifert}@sec.t-labs.tu-berlin.de Abstract. SMS-based One-Time Passwords (SMS OTP) were intro- duced to counter phishing andother
VULNERABILITY ANALYSIS AND ATTACKS ON NFC-ENABLED MOBILE Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones CollinMulliner FraunhoferInstituteforSecureInformationTechnology(SIT) collin.mulliner@sit.fraunhofer.de INJECTING SMS MESSAGES INTO SMART PHONES FOR SECURITY ANALYSIS Deutsche Telekom Laboratories 08.10.2009 1 Injecting SMS Messages into Smart Phones for Security Analysis Collin Mulliner Deutsche TelekomLaboratories /
WELCOME TO MULLINER.ORG/NET Collin R. Mulliner personal, weblog and my security research. Bluetooth Security and other Stuff. PalmOS Software. J2ME Games. Maemo (Nokia 770, N800, N810) Windows Mobile / PocketPC Security Research. NFC Security Research. Symbian OS Security Research. iPhone SecurityResearch.
MULLINER.ORG : ANDROID STUFF AND SECURITY RESEARCHCONTACTANDROID RELATED WEBLOG ENTRIES Android Stuff and Security Research Android related weblog entries. Security Research. SafetyNet Attestation. Slides: 44con ekoparty mod odex code on github. Study on Android In-App billing security paper: VirtualSwindle Android Security - the third party slides PatchDroid: Scalable Third-Party Security Patches for Android Devices more details and paper here: PatchDroid.com PUBLIC RESEARCH TAC DATABASE Public Research TAC Database. This is my attempt to build a TAC (Type Allocation Code) database for research purposes. I do this because there are no public databases that I can use for my research. There are existing databases such as nobbi.com, radioraiders, NokiaPort (a Nokia only TAC database), imei-number.com but they all just allow toquery the database.
BINTEGRITY - MULLINER.ORG BINtegrity is practical, and restricts the ability of attackers to exploit generic memory corruption vulnerabilities in COTS binaries. In contrast to other approaches, BINtegrity does not require access to source code, binary modification, or application specific configuration such as policies. Our evaluation demonstrates thatBINtegrity incurs
HID ATTACK - MULLINER.ORG HID is independent from Bluetooth and is also used for USB devices, of course it was used for USB long before Bluetooth even existed. The Bluetooth SIG just specified a small wrapper protocol to transport HID over Bluetooth. The described attack will basically hijack the system keyboard of a computer. INSIDE ANDROID’S SAFETYNET @COLLINRM ATTESTATION WWW Collin Mulliner 44con London, U.K. Sept 2017 About Me Mobile App development since 1997 (for PalmOS) Mobile Security since 1998 2001(hard to tell)
XKBD-BTHID : A SOFTWARE BLUETOOTH HID KEYBOARD xkbd-bthid is a Bluetooth HID Keyboard in software, meaning this is an application which emulates a Bluetooth Keyboard. I call it soft-HID. What could you use it for? You can turn any Linux box, PDA or tablet into Bluetooth keyboard and control your DVR, MP3 player or what ever with it. xkbd-bthid running on the Nokia770. Features. SMS-BASED ONE-TIME PASSWORDS: ATTACKS AND DEFENSE SMS-Based One-Time Passwords: Attacks and Defense (Short Paper) CollinMulliner1,RavishankarBorgaonkar2, PatrickStewin 2,andJean-PierreSeifert 1 NortheasternUniversity crm@ccs.neu.edu 2 TechnischeUniversit¨atBerlin {ravii,patrickx,jpseifert}@sec.t-labs.tu-berlin.de Abstract. SMS-based One-Time Passwords (SMS OTP) were intro- duced to counter phishing andother
VULNERABILITY ANALYSIS AND ATTACKS ON NFC-ENABLED MOBILE Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones CollinMulliner FraunhoferInstituteforSecureInformationTechnology(SIT) collin.mulliner@sit.fraunhofer.de INJECTING SMS MESSAGES INTO SMART PHONES FOR SECURITY ANALYSIS Deutsche Telekom Laboratories 08.10.2009 1 Injecting SMS Messages into Smart Phones for Security Analysis Collin Mulliner Deutsche TelekomLaboratories /
WELCOME TO MULLINER.ORG/NET Collin R. Mulliner personal, weblog and my security research. Bluetooth Security and other Stuff. PalmOS Software. J2ME Games. Maemo (Nokia 770, N800, N810) Windows Mobile / PocketPC Security Research. NFC Security Research. Symbian OS Security Research. iPhone SecurityResearch.
TAMING MR HAYES: MITIGATING SIGNALING BASED ATTACKS ON Taming Mr Hayes: Mitigating Signaling Based Attacks on Smartphones Collin Mulliner, Steffen Liebergeld, Matthias Lange, and Jean-PierreSeifert
SECURITY OF SMART PHONES The Master’s Thesis of Collin Richard Mulliner is approved: Professor Richard A. Kemmerer Professor Timothy Sherwood Professor Giovanni Vigna, Committee Chairperson INJECTING SMS MESSAGES INTO SMART PHONES FOR SECURITY ANALYSIS Deutsche Telekom Laboratories 08.10.2009 1 Injecting SMS Messages into Smart Phones for Security Analysis Collin Mulliner Deutsche TelekomLaboratories /
COLLIN R. MULLINER
has made some headlines in the security world since it is a relatively easy to exploit Linux local privilege escalation vulnerability. Perception Point (the company who found the vulnerability) claimed that approximately 66% of all Android devices are vulnerable to this issue, if this is true that would have quite some impact on Androidusers.
UNVEIL: A LARGE-SCALE, AUTOMATED APPROACH TO DETECTING UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware Amin Kharraz Northeastern University mkharraz@ccs.neu.edu Sajjad Arshad Northeastern University RUNTIME INTEGRITY CHECKING FOR EXPLOIT MITIGATION ON Runtime Integrity Checking for Exploit Mitigation on Embedded Devices 9th Conference on Trust & Trustworthy Computing, Vienna, August 2016 Exploit Mitigation - State of the Art •Inject payload •Data Execution Prevention • MMU hardware support required (SW emulationslow)
RANDOM TALES FROM A MOBILE PHONE HACKER Collin Mulliner SecT @ TUBerlin CanSecWest March 2010 2 About Myself Mobile device security researcher PhD student in Berlin, Germany I hack it if: it looks or acts like a BERLIN INSTITUTE OF TECHNOLOGY 18.6.2011 2 Collin Mulliner – NinjaCon / B-Sides Vienna “Hacking NFC and NDEF” History of this Talk :-) Started looking at NFC phone security in 2007/2008 Found a bunch of bugs in THE NFC phone of that time Traveled to Vienna to look at NFC services in the field 2008 – 2010 (end of) NFC looked totally dead to me NFC got interesting again(Google Nexus S)
EXPLOITING SYMBIAN
Collin Mulliner Exploiting Symbian 25C3 Berlin 2008 WELCOME TO MULLINER.ORG/NET Collin R. Mulliner personal, weblog and my security research. Bluetooth Security and other Stuff. PalmOS Software. J2ME Games. Maemo (Nokia 770, N800, N810) Windows Mobile / PocketPC Security Research. NFC Security Research. Symbian OS Security Research. iPhone SecurityResearch.
MULLINER.ORG : ANDROID STUFF AND SECURITY RESEARCHCONTACTANDROID RELATED WEBLOG ENTRIES Android Stuff and Security Research Android related weblog entries. Security Research. SafetyNet Attestation. Slides: 44con ekoparty mod odex code on github. Study on Android In-App billing security paper: VirtualSwindle Android Security - the third party slides PatchDroid: Scalable Third-Party Security Patches for Android Devices more details and paper here: PatchDroid.com PUBLIC RESEARCH TAC DATABASE Public Research TAC Database. This is my attempt to build a TAC (Type Allocation Code) database for research purposes. I do this because there are no public databases that I can use for my research. There are existing databases such as nobbi.com, radioraiders, NokiaPort (a Nokia only TAC database), imei-number.com but they all just allow toquery the database.
BINTEGRITY - MULLINER.ORG BINtegrity is practical, and restricts the ability of attackers to exploit generic memory corruption vulnerabilities in COTS binaries. In contrast to other approaches, BINtegrity does not require access to source code, binary modification, or application specific configuration such as policies. Our evaluation demonstrates thatBINtegrity incurs
HID ATTACK - MULLINER.ORG HID is independent from Bluetooth and is also used for USB devices, of course it was used for USB long before Bluetooth even existed. The Bluetooth SIG just specified a small wrapper protocol to transport HID over Bluetooth. The described attack will basically hijack the system keyboard of a computer. INSIDE ANDROID’S SAFETYNET @COLLINRM ATTESTATION WWW Collin Mulliner 44con London, U.K. Sept 2017 About Me Mobile App development since 1997 (for PalmOS) Mobile Security since 1998 2001(hard to tell)
SMS-BASED ONE-TIME PASSWORDS: ATTACKS AND DEFENSE SMS-Based One-Time Passwords: Attacks and Defense (Short Paper) CollinMulliner1,RavishankarBorgaonkar2, PatrickStewin 2,andJean-PierreSeifert 1 NortheasternUniversity crm@ccs.neu.edu 2 TechnischeUniversit¨atBerlin {ravii,patrickx,jpseifert}@sec.t-labs.tu-berlin.de Abstract. SMS-based One-Time Passwords (SMS OTP) were intro- duced to counter phishing andother
XKBD-BTHID : A SOFTWARE BLUETOOTH HID KEYBOARD xkbd-bthid is a Bluetooth HID Keyboard in software, meaning this is an application which emulates a Bluetooth Keyboard. I call it soft-HID. What could you use it for? You can turn any Linux box, PDA or tablet into Bluetooth keyboard and control your DVR, MP3 player or what ever with it. xkbd-bthid running on the Nokia770. Features. VULNERABILITY ANALYSIS AND ATTACKS ON NFC-ENABLED MOBILE Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones CollinMulliner FraunhoferInstituteforSecureInformationTechnology(SIT) collin.mulliner@sit.fraunhofer.de INJECTING SMS MESSAGES INTO SMART PHONES FOR SECURITY ANALYSIS Deutsche Telekom Laboratories 08.10.2009 1 Injecting SMS Messages into Smart Phones for Security Analysis Collin Mulliner Deutsche TelekomLaboratories /
WELCOME TO MULLINER.ORG/NET Collin R. Mulliner personal, weblog and my security research. Bluetooth Security and other Stuff. PalmOS Software. J2ME Games. Maemo (Nokia 770, N800, N810) Windows Mobile / PocketPC Security Research. NFC Security Research. Symbian OS Security Research. iPhone SecurityResearch.
MULLINER.ORG : ANDROID STUFF AND SECURITY RESEARCHCONTACTANDROID RELATED WEBLOG ENTRIES Android Stuff and Security Research Android related weblog entries. Security Research. SafetyNet Attestation. Slides: 44con ekoparty mod odex code on github. Study on Android In-App billing security paper: VirtualSwindle Android Security - the third party slides PatchDroid: Scalable Third-Party Security Patches for Android Devices more details and paper here: PatchDroid.com PUBLIC RESEARCH TAC DATABASE Public Research TAC Database. This is my attempt to build a TAC (Type Allocation Code) database for research purposes. I do this because there are no public databases that I can use for my research. There are existing databases such as nobbi.com, radioraiders, NokiaPort (a Nokia only TAC database), imei-number.com but they all just allow toquery the database.
BINTEGRITY - MULLINER.ORG BINtegrity is practical, and restricts the ability of attackers to exploit generic memory corruption vulnerabilities in COTS binaries. In contrast to other approaches, BINtegrity does not require access to source code, binary modification, or application specific configuration such as policies. Our evaluation demonstrates thatBINtegrity incurs
HID ATTACK - MULLINER.ORG HID is independent from Bluetooth and is also used for USB devices, of course it was used for USB long before Bluetooth even existed. The Bluetooth SIG just specified a small wrapper protocol to transport HID over Bluetooth. The described attack will basically hijack the system keyboard of a computer. INSIDE ANDROID’S SAFETYNET @COLLINRM ATTESTATION WWW Collin Mulliner 44con London, U.K. Sept 2017 About Me Mobile App development since 1997 (for PalmOS) Mobile Security since 1998 2001(hard to tell)
SMS-BASED ONE-TIME PASSWORDS: ATTACKS AND DEFENSE SMS-Based One-Time Passwords: Attacks and Defense (Short Paper) CollinMulliner1,RavishankarBorgaonkar2, PatrickStewin 2,andJean-PierreSeifert 1 NortheasternUniversity crm@ccs.neu.edu 2 TechnischeUniversit¨atBerlin {ravii,patrickx,jpseifert}@sec.t-labs.tu-berlin.de Abstract. SMS-based One-Time Passwords (SMS OTP) were intro- duced to counter phishing andother
XKBD-BTHID : A SOFTWARE BLUETOOTH HID KEYBOARD xkbd-bthid is a Bluetooth HID Keyboard in software, meaning this is an application which emulates a Bluetooth Keyboard. I call it soft-HID. What could you use it for? You can turn any Linux box, PDA or tablet into Bluetooth keyboard and control your DVR, MP3 player or what ever with it. xkbd-bthid running on the Nokia770. Features. VULNERABILITY ANALYSIS AND ATTACKS ON NFC-ENABLED MOBILE Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones CollinMulliner FraunhoferInstituteforSecureInformationTechnology(SIT) collin.mulliner@sit.fraunhofer.de INJECTING SMS MESSAGES INTO SMART PHONES FOR SECURITY ANALYSIS Deutsche Telekom Laboratories 08.10.2009 1 Injecting SMS Messages into Smart Phones for Security Analysis Collin Mulliner Deutsche TelekomLaboratories /
WELCOME TO MULLINER.ORG/NET Collin R. Mulliner personal, weblog and my security research. Bluetooth Security and other Stuff. PalmOS Software. J2ME Games. Maemo (Nokia 770, N800, N810) Windows Mobile / PocketPC Security Research. NFC Security Research. Symbian OS Security Research. iPhone SecurityResearch.
BINTEGRITY - MULLINER.ORG BINtegrity is practical, and restricts the ability of attackers to exploit generic memory corruption vulnerabilities in COTS binaries. In contrast to other approaches, BINtegrity does not require access to source code, binary modification, or application specific configuration such as policies. Our evaluation demonstrates thatBINtegrity incurs
VIRTUALSWINDLE: AN AUTOMATED ATTACK AGAINST IN-APP BILLING VirtualSwindle: An Automated Attack Against In-App Billing on Android Collin Mulliner Northeastern University Boston, MA crm@ccs.neu.eduWilliam Robertson
BLUESPAM - MULLINER.ORG BlueSpam. BlueSpam BlueSpam searches for all discoverable bluetooth devices and sends a file to them (spams them) if they support OBEX. By default a small text will be send. INJECTING SMS MESSAGES INTO SMART PHONES FOR SECURITY ANALYSIS Deutsche Telekom Laboratories 08.10.2009 1 Injecting SMS Messages into Smart Phones for Security Analysis Collin Mulliner Deutsche TelekomLaboratories /
TAMING MR HAYES: MITIGATING SIGNALING BASED ATTACKS ON Taming Mr Hayes: Mitigating Signaling Based Attacks on Smartphones Collin Mulliner, Steffen Liebergeld, Matthias Lange, and Jean-PierreSeifert
RUNTIME INTEGRITY CHECKING FOR EXPLOIT MITIGATION ON Runtime Integrity Checking for Exploit Mitigation on Embedded Devices 9th Conference on Trust & Trustworthy Computing, Vienna, August 2016 Exploit Mitigation - State of the Art •Inject payload •Data Execution Prevention • MMU hardware support required (SW emulationslow)
COLLIN R. MULLINER
has made some headlines in the security world since it is a relatively easy to exploit Linux local privilege escalation vulnerability. Perception Point (the company who found the vulnerability) claimed that approximately 66% of all Android devices are vulnerable to this issue, if this is true that would have quite some impact on Androidusers.
BERLIN INSTITUTE OF TECHNOLOGY 18.6.2011 2 Collin Mulliner – NinjaCon / B-Sides Vienna “Hacking NFC and NDEF” History of this Talk :-) Started looking at NFC phone security in 2007/2008 Found a bunch of bugs in THE NFC phone of that time Traveled to Vienna to look at NFC services in the field 2008 – 2010 (end of) NFC looked totally dead to me NFC got interesting again(Google Nexus S)
BERLIN INSTITUTE OF TECHNOLOGY 15 Collin Mulliner – SummerCon 2012 “Binary Instrumentation on Android” Symbol Lookup Code taken from: Victor Zandy (from hijack.c) – Thanks man! Read /proc//maps –CONTACT
webmastermulliner.orgSITE INDEX
Imprint/Impressum
Collin R. Mulliner personal , weblog and my securityresearch
Bluetooth Security and other StuffPalmOS Software
J2ME Games
Maemo (Nokia 770, N800, N810) Windows Mobile / PocketPC Security Research NFC Security Research Symbian OS Security Research iPhone Security Research Android Stuff and Security ResearchTAC database
powered by: BETAVERSiON.NETDetails
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0