<?xml version="1.0"?>
<!-- name="generator" content="blosxom/2.0" -->
<!DOCTYPE rss PUBLIC "-//Netscape Communications//DTD RSS 0.91//EN" "http://my.netscape.com/publish/formats/rss-0.91.dtd">

<rss version="0.91">
  <channel>
    <title>Collin R. Mulliner   </title>
    <link>http://www.mulliner.org/blog/blosxom.cgi</link>
    <description>...stuff I do and things I like... </description>
    <language>en</language>

  <item>
 <title>FwAnalyzer</title>
 <pubDate>Wed, 07 Aug 2019 18:59:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2019/08/07#fwanalyzer</link>
 <description>
today we release &lt;a href=&quot;https://fwanalyzer.io&quot;&gt;FwAnalyzer&lt;/a&gt; open source, FwAnalyzer is tool for security analysis of firmware images - specifically for firmware images of Linux-based devices. For more details see the blog post I wrote for the company's blog at: &lt;a href=&quot;https://medium.com/cruise/firmware-security-fwanalyzer-dcbd95cef717&quot;&gt;Automating Firmware Security with FwAnalyzer&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
Later today I will present on how we do &lt;A href=&quot;https://www.blackhat.com/us-19/briefings/schedule/index.html#come-join-the-cafsa---continuous-automated-firmware-security-analysis-14918&quot;&gt;Continuous Automated Firmware Security Analysis&lt;/a&gt; at Cruise.</description>
 </item>
  <item>
 <title>Getting 'rid' of pre-installed Malware on my YellYouth Android Tablet</title>
 <pubDate>Sat, 05 Jan 2019 21:51:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2019/01/05#yellyouth_android_malware</link>
 <description>
In November I bought a cheap Android Tablet for a wall-mounted display (see this blog post: &lt;a href=&quot;https://www.mulliner.org/blog/blosxom.cgi/projects/android_infopanel.html&quot;&gt;Android InfoPanel&lt;/a&gt;). After a couple of days (or weeks?) suddenly some overlay ads and warnings from Google Play about malicious apps appeared. I didn't have time to investigate so I just tried to close the apps and ads. This got more complicated since all of it was in Chinese. I ended up navigating the menu of what looked like a 3rd-party app store to uninstall an app named &lt;i&gt;Retipuj&lt;/i&gt; that was flag by Google Play for ad-fraud. All of this using Google Translate on my phone.&lt;br&gt;&lt;br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;I bought this Chinese Android tablet (yellyouth) for a project and it randomly installs apps in the background. Apps that are flagged by google play as &amp;quot;ad-fraud&amp;quot;. The &amp;quot;fun part&amp;quot; was using google translate on my phone to navigate their app market app.&lt;/p&gt;&amp;mdash; Collin Mulliner (@collinrm) &lt;a href=&quot;https://twitter.com/collinrm/status/1073659698270879748?ref_src=twsrc%5Etfw&quot;&gt;December 14, 2018&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;https://platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;br&gt;
This solution worked for a couple of days. Returning back from my Holiday trip I was greeted by overlay ads once again. Luckily I had some time on my hands to investigate.
Here a short write-up.
&lt;br&gt;&lt;br&gt;

Part 1, observations and hoping for an easy way out:
&lt;ul&gt;
I found one app that I didn't install (com.hero.filter), I uninstalled it via &lt;i&gt;adb uninstall com.hero.filter&lt;/i&gt;. 
I tried Googling the package name but without success.
&lt;br&gt;&lt;br&gt;
Removing the app didn't seem to do anything.
Judging by the task bar there still seem to be a number of apps running but checking via Settings/Apps and on the filesystem (/data/apps) no apps are installed.
Every now and then a pop-up appears that looks like a 3rd party market trying to download and install apps. 
Installation is blocked by Google Play (verified apps I assume).
&lt;/ul&gt;

&lt;br&gt;

Part 2, looking at processes:
&lt;ul&gt;
I found two interesting looking processes &lt;i&gt;net.atlas.utopia&lt;/i&gt; and &lt;i&gt;android.hb.uys.pbuild&lt;/i&gt; looking at the SeLinux context they seem to be platform apps (u:r:platform_app:s0).
These could be candidates (spoiler - they are).
Using &lt;i&gt;pm list packages -f&lt;/i&gt; I determined that net.atlas.utopia is install in /system/priv-app/Kyz2203 with the data in /data/data/net.atlas.utopia.
&lt;br&gt;
&lt;br&gt;
pm list packages -f (only showing some interesting packages):
&lt;ul&gt;
&lt;pre&gt;
package:/data/app/com.hero.filter-1/base.apk=com.hero.filter
package:/system/app/AutoDialer/AutoDialer.apk=com.example
package:/system/priv-app/Kyz2203/Kyz2203.apk=net.atlas.utopia
package:/system/priv-app/reanimation/reanimation.apk=android.hb.uys.pbuild
&lt;/pre&gt;
&lt;/ul&gt;
&lt;/ul&gt;

&lt;br&gt;

Part 3, a quick peak into net.atlas.utopia:
&lt;ul&gt;
Permissions: this app has like every permission you can think off including install and delete packages, send SMS, read and write any setting and file.
Further it has a number of app permissions that correspond to lenovo, oppo, huawei, and htc devices.
&lt;br&gt;&lt;br&gt;
The app registers intent filters for a number of events: boot up, time zone change, packages install/remove, outgoing calls, etc.
It basically monitors everything that is going on on the device. Pretty shitty.
&lt;br&gt;&lt;br&gt;
The data directory also contained a dex file with the name &lt;i&gt;whatsappui1.dex&lt;/i&gt;. A quick Google search on &lt;i&gt;whatsappui1&lt;/i&gt; has one hit on team cymru's hash list: &lt;a href=&quot;https://totalhash.cymru.com/analysis/?d8087bc3ad65590fc7eb1fdcc7a995871405e80d&quot;&gt;whatsappui1&lt;/a&gt; with not much details but identify the file as being associated with ad-based malware.
&lt;br&gt;&lt;br&gt;
The most interesting thing I found in this app is the use of a 3rd party library called &lt;a href=&quot;https://github.com/DroidPluginTeam/DroidPlugin&quot;&gt;DroidPlugin&lt;/a&gt;. 
DroidPlugin is a plugin framework for Android that allows to run any third-party apk without installation, modification or repackage.
Seems like the perfect tool for malware distribution.
&lt;/ul&gt;

&lt;br&gt;

Part 4, a quick peak into android.hb.uys.pbuild:
&lt;ul&gt;
Permissions are very similar to the net.atlas.utopia including the permissions corresponding to specific device manufacturers.
&lt;br&gt;&lt;br&gt;
The manifest contains traces of ad related things. The library directory contains libiohook.so. The library contains symbols from &lt;i&gt;Cydia Substrate&lt;/i&gt;. 
The library name appears in various search results that indicate ad related malware.
&lt;br&gt;&lt;br&gt;
The asset directory contains a certificate &lt;i&gt;ky_dsa_public.crt&lt;/i&gt; with no interesting issuer. jar file that contains a dex file and two .png files that contain ascii/text.
&lt;/ul&gt;

&lt;br&gt;

Part 5, getting rid of it all:
&lt;ul&gt;
How do we get rid of pre-installed software? 
The system partition is read-only so we can't uninstall it! 
The best idea, that does not involve rooting and flashing new firmware, is disabling the package using the package manager (pm disable net.atlas.utopia) this however requires system privileges.
You don't have system privileges without rooting. You can disable apps via Settings but you can only disable them if they are in the list. 
The ones we want to disable are not in the list.

&lt;br&gt;&lt;br&gt;
How do we get system? 
The tablet still runs a 3.10.72 kernel so it might be vulnerable to dirtycow. 
I checked using the tools from &lt;a href=&quot;https://github.com/timwr/CVE-2016-5195&quot;&gt;timwr&lt;/a&gt; and yes it is vulnerable to dirtycow.

Using my modified version of run-as as shown in &lt;a href=&quot;https://www.mulliner.org/collin/publications/InsideAndroidsSafetyNetAttestation_mulliner44con.pdf#page=74&quot;&gt;my SafetyNet Talk&lt;/a&gt;
we can become the system user and disable any package we want by running: &lt;i&gt;pm disable PACKAGE&lt;/i&gt;.
&lt;br&gt;&lt;br&gt;

Here the list of packages I disabled, so far no APKs are getting installed and I haven't seen any more ads.
&lt;br&gt;&lt;br&gt;
pm list packages -d
&lt;ul&gt;
&lt;pre&gt;
package:com.mediatek.schpwronoff
package:android.hb.uys.pbuild
package:com.mediatek.ygps
package:com.android.htmlviewer
package:com.android.browser
package:com.hero.filter
package:com.example
package:com.svox.pico
package:com.opera.max.global
package:com.android.dreams.phototable
package:net.atlas.utopia
package:com.mediatek.weather
package:com.opera.max.loader
package:com.qihoo.appstore
package:com.fw.upgrade.sysoper
package:com.android.vpndialogs
&lt;/pre&gt;
&lt;/ul&gt;
&lt;/ul&gt;

&lt;br&gt;

Part 7, Dirtycow trickery:
&lt;ul&gt;
As described on &lt;a href=&quot;https://www.mulliner.org/collin/publications/InsideAndroidsSafetyNetAttestation_mulliner44con.pdf#page=74&quot;&gt;my slides&lt;/a&gt; 
you can modify run-as.c from timwr to become any UID with almost any SELinux context (depending on the device's SeLinux policy!).
For our purpose we can become any UID and context that we require.
Below some notes on how this works.&lt;br&gt;&lt;br&gt;

Dirtycow lets you overwrite any file that is how you replace /system/bin/run-as with your own binary.
The binary cannot be bigger then the one you are overwriting.
This might be a problem when you have a very very small run-as (9k in my case).
&lt;pre&gt;
1|shell@KT107:/data/local/tmp $ ls -al /system/bin/run-as                      
-rwsr-s--- root     shell        9444 2018-09-27 03:44 run-as
&lt;/pre&gt;
The workaround I took was not using ndk-build to build run-as.c and instead manually running arm gcc.
This will reduce the binary size due to discarding complier flags used by the ndk. 
Another solution would be to just load a shared library from run-as to keep the binary size small.

&lt;br&gt;&lt;br&gt;
Once you have my version of run-as you can become (almost) any user.
&lt;pre&gt;
shell@KT107:/data/local/tmp $ run-as 1000 u:r:platform_app:s0
shell@KT107:/data/local/tmp $ id
uid=1000(system) gid=1000(system) groups=1003(graphics),1004(input),1007(log),1011(adb),1015(sdcard_rw),1028(sdcard_r),3001(net_bt_admin),3002(net_bt),3003(inet),3006(net_bw_stats) context=u:r:platform_app:s0
&lt;/pre&gt;
System (UID 1000) allows you to poke around /data/app/* and /data/data.
If you want to explore /data/data/APP you need to assume the UID and context of that app.
&lt;pre&gt;
shell@KT107:/data/data $ ls -al
drwxr-x--x u0_a13   u0_a13            u:object_r:app_data_file:s0 net.atlas.utopia
run-as 10013 u:r:platform_app:s0
shell@KT107:/data/data $ id
uid=10013(u0_a13) gid=10013(u0_a13) groups=1003(graphics),1004(input),1007(log),1011(adb),1015(sdcard_rw),1028(sdcard_r),3001(net_bt_admin),3002(net_bt),3003(inet),3006(net_bw_stats) context=u:r:platform_app:s0
shell@KT107:/data/data/net.atlas.utopia $ ls -al
drwx------ u0_a13   u0_a13            2017-12-31 19:00 Plugin
drwxrwx--x u0_a13   u0_a13            2017-12-31 19:00 app_dex
drwxrwx--x u0_a13   u0_a13            2017-12-31 19:00 cache
drwxrwx--x u0_a13   u0_a13            2017-12-31 19:00 databases
drwx------ u0_a13   u0_a13            2017-12-31 19:00 fankingbox
lrwxrwxrwx install  install           2015-12-31 19:00 lib -&gt; /data/app-lib/net.atlas.utopia
drwxrwx--x u0_a13   u0_a13            2019-01-03 15:56 shared_prefs
-rw------- u0_a13   u0_a13       9572 2019-01-03 15:54 whatsappui1.dex
&lt;/pre&gt;
&lt;br&gt;
Below is my patch for run-as.c. My version sets the UID from the first argument and the SELinux context from the second argument.&lt;br&gt;
&lt;pre&gt;
--- run-as-crm.c	2019-01-03 17:54:41.153471054 -0500
+++ run-as.c	2019-01-03 17:58:39.378353437 -0500
@@ -28,6 +28,8 @@
 {
 	LOGV(&quot;uid %s %d&quot;, argv[0], getuid());
 
+	int duid = atoi(argv[1]);
+
 	if (setresgid(0, 0, 0) || setresuid(0, 0, 0)) {
 		LOGV(&quot;setresgid/setresuid failed&quot;);
 	}
@@ -56,7 +58,7 @@
 				LOGV(&quot;dlsym setcon error %s&quot;, error);
 			} else {
 				setcon_t * setcon_p = (setcon_t*)setcon;
-				ret = (*setcon_p)(&quot;u:r:shell:s0&quot;);
+				ret = (*setcon_p)(argv[2]);
 				ret = (*getcon_p)(&amp;secontext);
 				LOGV(&quot;context %d %s&quot;, ret, secontext);
 			}
@@ -66,6 +68,12 @@
 		LOGV(&quot;no selinux?&quot;);
 	}
 
+	if (setresgid(duid, duid, duid) || setresuid(duid, duid, duid)) {
+		LOGV(&quot;setresgid/setresuid failed&quot;);
+	}
+	LOGV(&quot;uid %d&quot;, getuid());
+
 	system(&quot;/system/bin/sh -i&quot;);
 
-}
\ No newline at end of file
+}
+
&lt;/pre&gt;
&lt;/ul&gt;

&lt;br&gt;

Conclusions:
&lt;ul&gt;
Overall I would have preferred to not get pre-installed malware on my Android Tablet as I would rather have
spent my time on my InfoPanel app or on other projects. 
However it was impossible for me to ignore this issue and simply buy a different tablet.
Tracking down the malware still was kinda fun. It was the first time I experienced the issue of pre-installed malware first hand.
I' also fairly happy that I didn't have to modify the firmware since this would have cost way more time.
The most interesting thing I found was definitely the DroidPlugin project that allows running APKs without installing them.
I wish I had more time to reverse engineer all the different apps and how they work together.
I uploaded a zip file containing most components I talked about in this blog post here: &lt;a href=&quot;/android/feed/yellyouth.zip&quot;&gt;yellyouth.zip&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
I hope I finally disabled all of the components and have an ad free device.

&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Third Party Android App Stores</title>
 <pubDate>Fri, 26 Jan 2018 02:41:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2018/01/26#thirdpartyandroidappstores</link>
 <description>
I wrote an article for the Parallax about &lt;A href=&quot;https://www.the-parallax.com/2018/01/25/safer-android-google-play/&quot;&gt;the security of third party Android app stores&lt;/a&gt;.</description>
 </item>
  <item>
 <title>Mobile Security News Update October 2017</title>
 <pubDate>Tue, 24 Oct 2017 13:52:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2017/10/24#mobile_security_news_update_oct2017</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://pacsec.jp/speakers.html&quot;&gt;PacSec&lt;/a&gt; Nov 1-2, Tokyo, Japan.
Grandma's old bag, how outdated libraries spoil Android app security by Marc Schoenefeld.
When encryption is not enough: Attacking Wearable - Mobile communication over BLE by Kavya Racharla.
The Art of Exploiting Unconventional Use- after-free Bugs in Android Kernel by Di Shen.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://deepsec.net/schedule.html&quot;&gt;DeepSec&lt;/a&gt; Nov 14-17, Vienna, Austria.
Normal Permissions In Android: An Audiovisual Deception by Constantinos Patsakis.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/eu-17/briefings/schedule/index.html&quot;&gt;Black Hat Europe 2017&lt;/a&gt; Dec 4-7, London, UK.
ATTACKING NEXTGEN ROAMING NETWORKS by Daniel Mende, Hendrik Schmidt.
ATTACKS AGAINST GSMA'S M2M REMOTE PROVISIONING by Maxime Meyer.
BLUEBORNE - A NEW CLASS OF AIRBORNE ATTACKS THAT CAN REMOTELY COMPROMISE ANY LINUX/IOT DEVICE by Ben Seri, Gregory Vishnepolsky.
DIFUZZING ANDROID KERNEL DRIVERS by Aravind Machiry, Chris Salls, Jake Corina, Shuang Hao, Yan Shoshitaishvili.
HOW SAMSUNG SECURES YOUR WALLET AND HOW TO BREAK IT by HC MA.
INSIDE ANDROID'S SAFETYNET ATTESTATION by Collin Mulliner, John Kozyrakis.
JAILBREAKING APPLE WATCH by Max Bazaliy.
RO(O)TTEN APPLES: VULNERABILITY HEAVEN IN THE IOS SANDBOX by Adam Donenfeld.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
Quick conference review: both 44con and ekoparty were great. Ekoparty was especially awesome since I got to check the last continent off my list. Also the size of ekoparty was way beyond what I was expecting. They managed to have a really good
conference that is professionally run while stilling maintaining the vibe of a hacker / underground con &lt;3
&lt;br&gt;&lt;br&gt;

Two weeks ago there was a post on Medium about &lt;a href=&quot;https://medium.com/@philipn/want-to-see-something-crazy-open-this-link-on-your-phone-with-wifi-turned-off-9e0adb00d024&quot;&gt;two companies that provide a mobile identification service&lt;/a&gt;. That
service basically can be used to convert your phone's IP address into real information about the owner of the phone (the contract owner). This is done via APIs that are provided by multiple Mobile Network Operators (such as AT&amp;T). The medium article linked to demo pages of those two service providers (payfone and danal inc) that show not only your phone number but also your operator's name, your name and address.&lt;br&gt;&lt;br&gt;
I played with the two demo sites for a bit (while they were still online - offline now). I'm on Google Fi with a number proted from T-Mobile (pre-paid). Payfone only had my phonenumber and old carrier (T-Mobile) while Danal inc showed no data at all. I never provided any data to T-Mobile since it is not required for a pre-paid card. Google has all the data but likely does not share it with 3rd parties.&lt;br&gt;&lt;br&gt;
Overall this is a service that I really don't want to exist. I don't want an abritary company to be able to identify me
while visiting their website from my mobile phone. I hope those companies don't just sell their services to anybody.
Read the Medium article again: AT&amp;T consumer choice opt-out doesn't affect this!
&lt;br&gt;&lt;br&gt;

&lt;b&gt;iOS 11 the tragedy continues:&lt;/b&gt; 11.0 had a bunch of flaws that were annyoing. Now 11.0.3 randomly frezzes my phone for minutes. Also I have some issues with voice call audio not working sometimes. Highly disaspointing!
&lt;br&gt;&lt;br&gt;

Pictures of the month:
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;cy&quot; dir=&quot;ltr&quot;&gt;Saw a throne of phones in Göteborg. &lt;a href=&quot;https://t.co/wE6M5e2WPa&quot;&gt;pic.twitter.com/wE6M5e2WPa&lt;/a&gt;&lt;/p&gt;&amp;mdash; Mikko Hypponen (@mikko) &lt;a href=&quot;https://twitter.com/mikko/status/920306776905535488?ref_src=twsrc%5Etfw&quot;&gt;October 17, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;Br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Today marks the third time one of my iPhones has vibrated itself out of alignment with its wireless charging pad over night. &lt;a href=&quot;https://t.co/HFchysZ7L9&quot;&gt;pic.twitter.com/HFchysZ7L9&lt;/a&gt;&lt;/p&gt;&amp;mdash; Matthew Panzarino (@panzer) &lt;a href=&quot;https://twitter.com/panzer/status/917786241503866880?ref_src=twsrc%5Etfw&quot;&gt;October 10, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;Br&gt;
&lt;blockquote class=&quot;twitter-video&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Have you ever seen two Android Banking Trojans beating each other for victim&amp;#39;s credit card information? &lt;a href=&quot;https://twitter.com/hashtag/Malware?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#Malware&lt;/a&gt; cc &lt;a href=&quot;https://twitter.com/malwrhunterteam?ref_src=twsrc%5Etfw&quot;&gt;@malwrhunterteam&lt;/a&gt; &lt;a href=&quot;https://t.co/EY6yQifVqp&quot;&gt;pic.twitter.com/EY6yQifVqp&lt;/a&gt;&lt;/p&gt;&amp;mdash; Lukas Stefanko (@LukasStefanko) &lt;a href=&quot;https://twitter.com/LukasStefanko/status/879674171386732547?ref_src=twsrc%5Etfw&quot;&gt;June 27, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;und&quot; dir=&quot;ltr&quot;&gt;&lt;a href=&quot;https://t.co/BBWLB8Zklu&quot;&gt;pic.twitter.com/BBWLB8Zklu&lt;/a&gt;&lt;/p&gt;&amp;mdash; jellphonic (@jellphonic) &lt;a href=&quot;https://twitter.com/jellphonic/status/912163075511410688?ref_src=twsrc%5Etfw&quot;&gt;September 25, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;

&lt;br&gt;
Links
&lt;ul&gt;
&lt;a href=&quot;https://www.wired.com/story/track-location-with-mobile-ads-1000-dollars-study/&quot;&gt;IT TAKES JUST $1,000 TO TRACK SOMEONE'S LOCATION WITH MOBILE ADS&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/bkerler/oppo_decrypt&quot;&gt;Oppo/Oneplus .ops Firmware decrypter&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/chaitin/passionfruit&quot;&gt;[WIP] Crappy iOS app analyzer&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://forum.xda-developers.com/showpost.php?p=74158225&amp;postcount=31&quot;&gt;Magisk v14.3&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://threatpost.com/down-the-rabbit-hole-with-a-blu-phone-infection/128390/&quot;&gt;Down the Rabbit Hole with a BLU Phone Infection&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.nttdocomo.co.jp/english/binary/pdf/corporate/technology/rd/technical_journal/bn//vol19_2/vol19_2_002en.pdf&quot;&gt;eSIM for Consumer Devices&lt;/a&gt; (PDF)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.welsvesecurity.com/2017/10/13/doublelocker-innovative-android-malware/&quot;&gt;Android Crypto-Ransomware that misuses accessibility services + encrypts data + changes PIN.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.trailofbits.com/2017/10/12/ios-jailbreak-detection-toolkit-now-available/&quot;&gt;iOS jailbreak detection toolkit now available from TraiOfBits&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://medium.com/@seamustuohy/administering-chromebooks-e4e924907352&quot;&gt;Administering Chromebooks For teams traveling to complex and hostile environments&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://rednaga.io/2016/11/14/hackingteam_back_for_your_androids/&quot;&gt;HackingTeam back for your Androids, now extra insecure!&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://support.apple.com/en-us/HT208112&quot;&gt;iOS 11 security updates&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://gizmodo.com/researchers-uber-s-ios-app-had-secret-permissions-that-1819177235&quot;&gt;Researchers: Uber's iOS App Had Secret Permissions That Allowed It to Copy Your Phone Screen&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.elcomsoft.com/2017/10/how-to-obtain-real-time-data-from-icloud-and-forget-about-2fa-with-just-an-old-itunes-backup-no-passwords-needed/&quot;&gt;How To Obtain Real-Time Data from iCloud and Forget About 2FA with Just an Old iTunes Backup. No Passwords Needed&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.thedailybeast.com/meet-danny-the-guy-selling-encrypted-phones-to-organized-crime&quot;&gt;Meet Danny, the Guy Authorities Say Is Selling Encrypted Phones to Organized Crime&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.virusbulletin.com/uploads/pdf/conference_slides/2017/Apvrille-VB2017-android-rev-eng-tools.pdf&quot;&gt;Android Reverse Engineering tools
Not the Usual Suspects&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://medium.com/@dhuma1981/understanding-new-apk-signature-scheme-v2-b705178f4d60&quot;&gt;Understanding new APK Signature Scheme V2?&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://hackerone.com/googleplay&quot;&gt;Google Play Security Reward Program&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://developer.samsung.com/teegris&quot;&gt;SAMSUNG TEEgris&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/Chainfire/suhide-lite&quot;&gt;source for suhide&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.sueddeutsche.de/digital/it-sicherheit-dieser-mann-weiss-wie-man-smartphones-aufbricht-1.3710425&quot;&gt;Dieser Mann weiss, wie man in Smartphones einbricht&lt;/a&gt; (German)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://infocon.org/&quot;&gt;NEW Rainbow Table added: GSM A5/1 table, 1.52 Terabytes in size. Torrent now available&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://stan.sh/posts/dns-requests-of-ios-devices&quot;&gt;Alarming number of DNS requests made by iOS devices&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://duo.com/blog/bluetooth-hacking-tools-comparison&quot;&gt;Bluetooth Hacking Tools Comparison&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.darkreading.com/attacks-breaches/unpatched-bugs-rampant-on-mobile-devices-in-financial-services-firms/d/d-id/1330197?_mc=sm_dr&amp;hootPostID=8a1f362014136559aa54d43b52d96013&quot;&gt;Unpatched Bugs Rampant on Mobile Devices in Financial Services Firms&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/google/Legilimency/&quot;&gt;Legitimacy: a Memory Research Platform for iOS&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://security.samsungmobile.com/securityUpdate.smsb&quot;&gt;Samsung Android Security Bulletin Oct 2017&lt;/a&gt; (a very long list!)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://events.linuxfoundation.org/sites/events/files/slides/LSS%20-%20Treble%20%27n%27%20SELinux_0.pdf&quot;&gt;SELinux in Android Oreo or: How I Learned to Stop Worrying and Love Attributes&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://source.android.com/security/bulletin/2017-10-01&quot;&gt;Android Security Bulletin - October 2017&lt;/a&gt; (now calling out individual vendors)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/integrity-sa/presentations/tree/master/pixelscamp2017&quot;&gt;Frida All The Things&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.xda-developers.com/magisk-module-mock-locations-screenshots/&quot;&gt;Magisk Module to Allow Location Mocking, Screenshots in Any App, and Disabling System Signature Verification&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.davidsopas.com/my-notes-on-hacking-ble-list-of-resources/&quot;&gt;notes on Hacking BLE - list of resources&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/abazhaniuk/Publications/raw/master/2017/Ekoparty13_2017/us-17-Bazhaniuk-Bulygin-BluePill-for-Your-Phone.pdf&quot;&gt;Blue Pill for Your Phone&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://money.cnn.com/2017/09/26/technology/bill-gates-android-phone/index.html?sr=twCNN092617bill-gates-android-phone0552PMStory&quot;&gt;Bill Gates just switched to an Android phone&lt;/a&gt; (Windows Phones is dead!)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://salmg.net/2017/09/29/nfc-contactless-cards-brute-forcing-processing-options/&quot;&gt;NFC - Contactless Cards: Brute Forcing Processing Options&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://googleprojectzero.blogspot.com/2017/09/over-air-vol-2-pt-1-exploiting-wi-fi.html&quot;&gt;Over The Air - Vol. 2, Pt. 1: Exploiting The Wi-Fi Stack on Apple Devices&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://t.co/uo5OFQ3JG1&quot;&gt;XNU kernel 4570.1.46 sources&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://outflux.net/slides/2017/kr/kspp.pdf&quot;&gt;Linux Kernel Self Protection Project&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.acolyer.org/2017/09/21/clkscrew-exposing-the-perils-of-security-oblivious-energy-management/&quot;&gt;CLKSCREW: Exposing the perils of security-oblivious energy management&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://images.apple.com/business/docs/FaceID_Security_Guide.pdf&quot;&gt; (pdf)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://arstechnica.com/information-technology/2017/09/in-a-first-android-apps-abuse-serious-dirty-cow-bug-to-backdoor-phones/&quot;&gt;In a first, Android apps abuse serious 'Dirty Cow' bug to backdoor phones&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/strazzere/android-scripts/blob/master/IDA/android_jni_assist.py&quot;&gt;Label enums for Android JNI to aid in reversing&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/feicong/jni_helper&quot;&gt;IDA jni helper&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://arstechnica.com/information-technology/2017/10/google-play-apps-with-as-many-as-2-6m-downloads-added-devices-to-botnet/?utm_content=buffer5e629&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer&quot;&gt;Google Play apps with as many as 2.6m downloads added devices to botnet&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://seap.samsung.com/linux-on-galaxy&quot;&gt;Samsung is gonna let you run any Linux distro on a Galaxy&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/rednaga/keystore-shim&quot;&gt;Shim to grab keystore backed data&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/doridori/Android-Security-Reference&quot;&gt;Android Security Reference (largely private notes of  @doriancussen)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://android-developers.googleblog.com/2017/09/google-play-billing-library-10-released.html&quot;&gt;Google Play Billing Library 1.0 released&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.it-securityguard.com/the-stony-path-of-android-%F0%9F%A4%96-bug-bounty-bypassing-certificate-pinning/&quot;&gt;The Stony Path of Android Bug Bounty - Bypassing Certificate Pinning&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://android-developers.googleblog.com/2017/08/hardening-kernel-in-android-oreo.html?m=1&quot;&gt;Hardening the Kernel in Android Oreo&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Biometrics and Smartphones</title>
 <pubDate>Mon, 25 Sep 2017 15:15:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2017/09/25#smartphone_biometrics</link>
 <description>
since I always rant about how I don't like biometrics in smartphones some people have asked me to formulate what I actually would like to see to happen in this area.&lt;br&gt;&lt;br&gt;

My dislike for biometrics is that you cannot change your password anymore because your &lt;i&gt;password&lt;/i&gt; is your finger, eye (iris), or face. That means you basically show you password to everybody. A good example of this is here: &lt;a href=&quot;http://www.bbc.com/news/technology-30623611&quot;&gt;Politician's fingerprint 'cloned from photos' by hacker&lt;/a&gt;.&lt;br&gt;&lt;br&gt;

The second part of the problem is that many biometric systems can be easily bypassed, some face recognition systems even with a picture shown on a smartphone screen.&lt;br&gt;&lt;br&gt;

My main issue is that biometric systems can be &lt;i&gt;bypassed&lt;/i&gt; by forcing the owner of the device to unlock it.
This can be done without leaving evidence, a funny example of this issue: &lt;A href=&quot;http://www.business2community.com/tech-gadgets/7-year-old-boy-uses-sleeping-dads-finger-unlock-iphone-01084983#VCtrl9aEMSu58Msq.97&quot;&gt;7-Year-Old Boy Uses Sleeping Dad's Finger To Unlock iPhone&lt;/a&gt;. Also see this interesting case: &lt;A href=&quot;https://arstechnica.com/tech-policy/2017/01/court-rules-against-man-who-was-forced-to-fingerprint-unlock-his-phone/&quot;&gt;Court rules against man who was forced to fingerprint-unlock his phone&lt;/a&gt;.&lt;br&gt;&lt;br&gt;

The main argument I always hear is that people who wouldn't set a password (or use just a simple PIN) are using biometrics and therefore are more secure now with the help of biometrics. The kid from the previous story wasn't stopped by biometrics it was just as good as not having a password.&lt;br&gt;&lt;br&gt;

What would have stopped the kid from unlocking his dad's phone? A simple timeout! Basically what I want to see is a timeout for your biometrics. Once you entered your password you can unlock your phone using biometrics, after a specific amount of time you have to re-enter your password and cannot unlock the device using biometrics.
With a timeout of say 30 minutes to one hour you can prevent simple attacks while still being able to use the convenience of biometrics. Apple recently introduced the &lt;A href=&quot;http://www.macworld.co.uk/how-to/iphone/how-use-sos-mode-on-iphone-3663371/&quot;&gt;SOS mode&lt;/a&gt; that will also disable biometric authentication until you enter your password. I wish this was taken one step further and let you set a timeout.
&lt;br&gt;&lt;br&gt;

I personally see biometrics on a smartphone as a pure convenience feature and treat it as a weak security feature. I only use it for ApplePay.&lt;br&gt;&lt;br&gt;

I think it is pretty bad to get people used to biometric authentication, Apple may get it right but other companies wont. Normal users can't determine this easily. Also how much did the additional hardware components cost to implement 
fingerprint authentication or face recognition. FaceID doesn't use a normal camera so there are definitely additional
costs that you as the user have to pay for this convenience feature.&lt;br&gt;&lt;br&gt;

Face recognition in consumer products also gets people to accept this as
an normal everyday thing and thus helps the argument for face recognition being used in surveillance. 
&lt;br&gt;&lt;Br&gt;

&lt;b&gt;/rant&lt;/b&gt;

&lt;br&gt;&lt;br&gt;
References:
&lt;Ul&gt;
&lt;a href=&quot;https://www.ccc.de/en/updates/2017/iriden&quot;&gt;Chaos Computer Clubs breaks iris recognition system of the Samsung Galaxy S8&lt;/a&gt; in May 2017&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid&quot;&gt;Chaos Computer Club breaks Apple TouchID&lt;/a&gt; iPhone 5s in 2013
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update September 2017</title>
 <pubDate>Tue, 19 Sep 2017 15:36:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2017/09/19#mobile_security_news_update_sep2017</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://www.ekoparty.org/speakers.php&quot;&gt;ekoparty&lt;/a&gt; Sep 27-29, Buenos Aires.
Blue Pill for your phone by Oleksandr Bazhaniuk.
Unbox Your Phone - Exploring and Breaking Samsung's TrustZone Sandboxes by Daniel Komaromy.
Inside Android's SafetyNet Attestation: Attack and Defense by Collin Mulliner.
How to cook Cisco: Exploit Development for Cisco IOS by George Nosenko.
Bypass Android Hack by Marcelo Romero.&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.virusbulletin.com/conference/vb2017/programme/&quot;&gt;Virus Bulletin&lt;/a&gt; 4-6 Oct, Madrid Span.
Last-minute paper: Publishing our malware stats by Jason Woloz (Google) [This is about Android Malware].
Android reverse engineering tools: not the usual suspects by Axelle Apvrille.
&lt;br&gt;
&lt;/ul&gt;

Some comments on &lt;a href=&quot;https://www.armis.com/blueborne/&quot;&gt;BlueBorne&lt;/a&gt;: I've been involved with Bluetooth security
since like forever (not active in the last 10+ years). The early Bluetooth vulnerabilities were mostly logic
bugs and issues such as missing authentication. Bluetooth devices could not be set to hidden and would always show
up when scanning for devices. Stuff like that. BlueBorne is different as it is a remote exploitable memory
corruption vulnerability in Linux, Android, and Windows. This is quite a novelty since we haven't seen a bug
that is more ore less the same on two platforms. Even more interesting is that this bug is pre-authentication and
gives you kernel privileges (code exec in the kernel). 
&lt;br&gt;&lt;br&gt;
In theory this set of vulnerabilities can be &lt;i&gt;bad, bad&lt;/i&gt;. In practice the issue is much less of an issue.
Exploit mitigations and built variances help mitigating the risk. 
Devices are not always visible therefore the attacker cannot easily find your device and attack it.&lt;br&gt;&lt;br&gt;
Also see: &lt;a href=&quot;https://motherboard.vice.com/en_us/article/nee8gz/hackers-could-silently-hack-your-cellphone-and-computers-over-bluetooth&quot;&gt;Hackers Could Silently Hack Your Cellphone And Computers Over Bluetooth&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;

FaceID: I think it is a really horrible idea! Do not put biometric systems in to consumer products ever! I will not buy products with mandatory biometrics
so far iOS allows me to turn it off and use a passphrase - thats why I even consider buying iOS devices. I hate this change -- biometrics are bad.
&lt;br&gt;&lt;Br&gt;

Pics:&lt;br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Huh, here I was looking to get a phone similar to Walmarts in-store model... And eBay just has their actual in-store model... Perfect! &lt;a href=&quot;https://t.co/sq4pUtCBe3&quot;&gt;pic.twitter.com/sq4pUtCBe3&lt;/a&gt;&lt;/p&gt;&amp;mdash; Tim Strazzere (@timstrazz) &lt;a href=&quot;https://twitter.com/timstrazz/status/909257728157028352&quot;&gt;September 17, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;&lt;a href=&quot;https://t.co/zqdwIa27IR&quot;&gt;https://t.co/zqdwIa27IR&lt;/a&gt;&lt;br&gt;&lt;br&gt;&amp;quot;Certified devices are also required to ship without pre-installed malware&amp;quot;&lt;br&gt;&lt;br&gt;A good requirement IMHO. 😛&lt;/p&gt;&amp;mdash; sp (@LambdaCube) &lt;a href=&quot;https://twitter.com/LambdaCube/status/902264909890600960&quot;&gt;August 28, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;
I agree ^^^
&lt;br&gt;&lt;Br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Badass! &lt;a href=&quot;https://twitter.com/cmwdotme&quot;&gt;@cmwdotme&lt;/a&gt; just demoed his new company&amp;#39;s ARM hypervisor  -- capable of running iOS instances on virtual iPhone6 hardware &lt;a href=&quot;https://twitter.com/hashtag/TenSec?src=hash&quot;&gt;#TenSec&lt;/a&gt; &lt;a href=&quot;https://t.co/vb9ld8cjIE&quot;&gt;pic.twitter.com/vb9ld8cjIE&lt;/a&gt;&lt;/p&gt;&amp;mdash; Ralf (RPW) (@esizkur) &lt;a href=&quot;https://twitter.com/esizkur/status/903174492654055424&quot;&gt;August 31, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Android Oreo feature spotlight: Changes to Verified Boot won&amp;#39;t allow you to start a downgraded OS &lt;a href=&quot;https://t.co/9RZqASUyeb&quot;&gt;https://t.co/9RZqASUyeb&lt;/a&gt; &lt;a href=&quot;https://t.co/Zz6OD4xliv&quot;&gt;pic.twitter.com/Zz6OD4xliv&lt;/a&gt;&lt;/p&gt;&amp;mdash; Android Police (@AndroidPolice) &lt;a href=&quot;https://twitter.com/AndroidPolice/status/905133451271069696&quot;&gt;September 5, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;


Links
&lt;ul&gt;
&lt;a href=&quot;http://events.linuxfoundation.org/sites/events/files/slides/LSS%20-%20Treble%20%27n%27%20SELinux.pdf&quot;&gt;SELinux in Android Oreo or: How I Learned to Stop Worrying and Love Attributes&lt;/a&gt; (presentation)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-mmap-exploitation-whitepaper-2017-09-18.pdf&quot;&gt;Kernel Driver mmap Handler Exploitation&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://arxiv.org/pdf/1709.05690.pdf&quot;&gt;BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://androidxref.com/8.0.0_r4/&quot;&gt;AndroidXRef now with Android O/8&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/rednaga/native-shim/commit/6847bd24fc8918b230b602b31c303dd53edeb55f&quot;&gt;Now the native-shim loader can create VM's for ART based Android devices&lt;/a&gt; by rednaga&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/timstrazz/status/907750068232495105&quot;&gt;Good thread about the Android Key Store API&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/Antid0teCom/aarch64_armv81extension&quot;&gt;IDA AArch64 processor extender extension: Adding support for ARMv8.1 opcodes
&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.hopperapp.com/blog/?p=219&quot;&gt;INJECTING MISSING METHODS AT RUNTIME&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/bkerler/oppo_decrypt&quot;&gt;Oppo/Oneplus .ops Firmware decrypter&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://source.android.com/security/keystore/&quot;&gt;Android Hardware-backed Keystore (docs)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://news.samsung.com/global/samsung-to-launch-mobile-security-rewards-program-welcoming-security-research-community&quot;&gt;Samsung to Launch Mobile Security Rewards Program, Welcoming Security Research Community&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://developer.android.com/about/versions/oreo/android-8.0-changes.html#security-all&quot;&gt;Android 8.0 includes the following security-related changes&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.samsungknox.com/en/blog/59a45d19e30181100034f460&quot;&gt;WHAT'S NEW IN KNOX 2.9?&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.pnfsoftware.com/blog/android-o-and-dex-version-38-new-dalvik-opcodes-to-support-dynamic-invocation/&quot;&gt;ANDROID O AND DEX 38: DALVIK OPCODES FOR DYNAMIC INVOCATION&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://census-labs.com/news/2017/08/22/shadow-v2-release/&quot;&gt;The public release of shadow v2 jemalloc exploitation tool with support for Android (both ARM32 and ARM64)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://android-developers.googleblog.com/2017/08/making-it-safer-to-get-apps-on-android-o.html&quot;&gt;Making it safer to get apps on Android O&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.fortiguard.com/events/2049/toorcon-19-san-diego-dig-deep-into-flexispy-for-android&quot;&gt;Dig Deep into FlexiSpy for Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/sslab-gatech/avpass&quot;&gt;Tool for leaking and bypassing Android malware detection system&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://tihmstar.net/etasonjb/&quot;&gt;iOS 8.4.1 32 bit jailbreak&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update August 2017</title>
 <pubDate>Tue, 22 Aug 2017 13:37:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2017/08/22#mobile_security_news_update_august2017</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://sandiego.toorcon.net/conference/&quot;&gt;toorcon san diego&lt;/a&gt; Aug 28th - Sep 3rd.
Dig Deep into FlexiSpy for Android by Kai Lu(@k3vinlusec).
&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://gsec.hitb.org/sg2017/&quot;&gt;HITB Singapore&lt;/a&gt; August 21-25.
The Original Elevat0r - History of a Private Jailbreak by Stefan Esser.
The Nightmare of Fragmentation: A Case Study of 200+ Vulnerabilities in Android Phones by BAI GUANGDONG and ZHANG QING.
&lt;br&gt;
&lt;br&gt;
Tencent Security Conference, August 30-31.
Pointer Authentication by Robert James Turner.
Finding iOS vulnerabilities in an easy way by Tiefel Wang and Hao Xu.
Bare-metal program tracing on ARM by Ralf-Philipp Weinmann.
&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;https://44con.com/44con/44con-2017/talks-2017/&quot;&gt;44con&lt;/a&gt; 13-15 September London, UK.
Inside Android's SafetyNet Attestation: What it can and can't do lessons learned from a large scale deployment by Collin Mulliner.
&lt;br&gt;
&lt;br&gt;
&lt;A href=&quot;https://2k17.balccon.org/speakers.html&quot;&gt;BalCCon2k17&lt;/a&gt; Novi Sad, Vojvodina, Serbia. September 15-17.
Mobile phone surveillance with BladeRF by Nikola Rasovic.
&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;https://t2.fi/schedule/2017/&quot;&gt;T2&lt;/a&gt; October 26-27 Helsinki, Finland.
Breaking Tizen by Amihai Neiderman.
&lt;Br&gt;
&lt;Br&gt;
&lt;a href=&quot;https://deepsec.net/schedule.html&quot;&gt;DeepSec&lt;/a&gt; Vienna 13-17 November.
Normal permissions in Android: An Audiovisual Deception by Constantinos Patsakis.
How secure are your VoLTE and VoWiFi calls? by Sreepriya Chalakkal.
&lt;/ul&gt;

Quick Conference Review
&lt;ul&gt;
It was good to see everybody in Vegas, even better meeting new people. Especially some folks I wanted to meet
for a long time. I had a good time at WOOT, meeting old friends was especially good. Maybe it helped that it
was in the CanSecWest hotel. I link a few relevant papers below.
&lt;/ul&gt;
&lt;br&gt;

Stefan Esser is running a kickstarter for an &lt;a href=&quot;https://www.kickstarter.com/projects/1210869059/ios-kernel-exploitation-training-course&quot;&gt;iOS Kernel Exploitation Training Course&lt;/a&gt; for Development of a freely available online iOS kernel exploitation training course based on iOS 9.3.5 on 32 bit devices. If you are into iOS security you should support Stefan's project!&lt;br&gt;&lt;br&gt;&lt;br&gt;

Ralf is on point as usual:&lt;br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Exhibit A) Our communities are tribalized: &lt;a href=&quot;https://t.co/e1uATFviYT&quot;&gt;https://t.co/e1uATFviYT&lt;/a&gt; (JTAG on iPhone 4S BB + exploitation of baseband vulns from SIM, in 2014)&lt;/p&gt;&amp;mdash; Ralf (RPW) (@esizkur) &lt;a href=&quot;https://twitter.com/esizkur/status/898883136389623808&quot;&gt;August 19, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;

Pictures of the month:
&lt;br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Burner kiddies at defcon be like: &lt;a href=&quot;https://t.co/3QyPTuJwFg&quot;&gt;pic.twitter.com/3QyPTuJwFg&lt;/a&gt;&lt;/p&gt;&amp;mdash; the grugq (@thegrugq) &lt;a href=&quot;https://twitter.com/thegrugq/status/888863130742267904&quot;&gt;July 22, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Some Chinese USB adapters have a hidden SIM that will send a text message with GPS coordinates to track an unknowing victim… &lt;a href=&quot;https://t.co/PK5bpkaBmv&quot;&gt;https://t.co/PK5bpkaBmv&lt;/a&gt;&lt;/p&gt;&amp;mdash; Dimitri Bouniol (@dimitribouniol) &lt;a href=&quot;https://twitter.com/dimitribouniol/status/895137766333231104&quot;&gt;August 9, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;ja&quot; dir=&quot;ltr&quot;&gt;中国のUSB充電アダプター型盗聴器が先進的すぎる。&lt;br&gt;充電器の上のふたを開けると、なんとSIMスロットがある。&lt;br&gt;SIMカードを挿入した状態で、このSIMカードの電話番号宛にSMSを送ると、コールバックし、これに出ると盗聴できる仕様。&lt;br&gt;もちろんGPS機能付きである。 &lt;a href=&quot;https://t.co/aMEF8sBdiL&quot;&gt;pic.twitter.com/aMEF8sBdiL&lt;/a&gt;&lt;/p&gt;&amp;mdash; 若ちゃん (@wk_tyn) &lt;a href=&quot;https://twitter.com/wk_tyn/status/894789440584929281&quot;&gt;August 8, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;

&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;😂 accident happens &lt;a href=&quot;https://twitter.com/hashtag/htc?src=hash&quot;&gt;#htc&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/privacy?src=hash&quot;&gt;#privacy&lt;/a&gt;  &lt;a href=&quot;https://twitter.com/hashtag/security?src=hash&quot;&gt;#security&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/Android?src=hash&quot;&gt;#Android&lt;/a&gt; &lt;a href=&quot;https://t.co/AJRAJRO1xK&quot;&gt;pic.twitter.com/AJRAJRO1xK&lt;/a&gt;&lt;/p&gt;&amp;mdash; nixCraft (@nixcraft) &lt;a href=&quot;https://twitter.com/nixcraft/status/887554451061391367&quot;&gt;July 19, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;br&gt;

Links
&lt;ul&gt;
&lt;a href=&quot;http://cs.ucsb.edu/~yanick/publications/2017_sec_bootstomp.pdf&quot;&gt;BootStomp: On the Security of Bootloaders in Mobile Devices&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://support.apple.com/en-us/HT207923&quot;&gt;Fixes in iOS 10.3.3&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/huntcve/slides/blob/master/seven_shen_shakacon.pdf&quot;&gt;Reviewing the Security of ASoC Drivers in Android Kernel&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://recon.cx/2017/montreal/resources/slides/RECON-MTL-2017-Hacking_Cell_Phone_Embedded_Systems.pdf&quot;&gt;Hacking Cell Phone Embedded Systems&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/mateuszk87/BadIntent&quot;&gt;Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://android-developers.googleblog.com/2017/07/seccomp-filter-in-android-o.html&quot;&gt;Seccomp filter in Android O&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/fs0c131y/SLocker&quot;&gt;This source code was obtained by reversing a sample of SLocker. It's not the original source code&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://googleprojectzero.blogspot.com/2017/07/trust-issues-exploiting-trustzone-tees.html&quot;&gt;Trust Issues: Exploiting TrustZone TEEs&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://techblog.mediaservice.net/2017/07/universal-android-ssl-pinning-bypass-with-frida/&quot;&gt;Universal Android SSL Pinning bypass with Frida&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.rtl-sdr.com/using-an-rtl-sdr-as-a-simple-imsi-catcher/&quot;&gt;USING AN RTL-SDR AS A SIMPLE IMSI CATCHER&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.exodusintel.com/2017/07/26/broadpwn/&quot;&gt;BROADPWN: REMOTELY COMPROMISING ANDROID AND IOS VIA A BUG IN BROADCOM'S WI-FI CHIPSETS&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.dw.com/en/surveillance-german-police-ready-to-hack-whatsapp-messages/a-39830250?maca=en-Twitter-sharing&quot;&gt;Surveillance: German police ready to hack WhatsApp messages&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.forbes.com/sites/thomasbrewster/2017/07/26/google-kills-pro-android-surveillance-malware/#412055142e3d&quot;&gt;Google May Have Just Uncovered An Israeli Surveillance Start-Up Spying On Androids&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://krebsonsecurity.com/2017/07/gas-pump-skimmer-sends-card-data-via-text/&quot;&gt;Gas Pump Skimmer Sends Card Data Via Text&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/docs/us-17/thursday/us-17-Shen-Defeating-Samsung-KNOX-With-Zero-Privilege.pdf&quot;&gt;Defeating Samsung KNOX with zero privilege&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://comsecuris.com/blog/posts/path_of_least_resistance/&quot;&gt;Path of Least Resistance: Cellular Baseband to Application Processor Escalation on Mediatek Devices&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.slideshare.net/i0n1c/cansecwest-2017-portal-to-the-ios-core&quot;&gt;Port(al) to the iOS Core&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/docs/us-17/wednesday/us-17-Borgaonkar-New-Adventures-In-Spying-3G-And-4G-Users-Locate-Track-And-Monitor.pdf&quot;&gt;New Adventures in Spying 3G &amp; 4G Users: Locate, Track, Monitor&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/docs/us-17/thursday/us-17-Yuwei-Ghost-Telephonist-Link-Hijack-Exploitations-In-4G-LTE-CS-Fallback.pdf&quot;&gt;Ghost Telephonist Link Hijack Exploitations in 4G&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;ihttps://alephsecurity.com/vulns/aleph-2017026&quot;&gt;OnePlus 2 Lack of SBL1 Validation Broken Secure Boot&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.youtube.com/watch?v=mzjRNvv69M8&amp;sns&quot;&gt;iOS 10.3.2 XPC Userland Jailbreak Exploit Tutorial - CVE-2017-7047 by Ian Beer&lt;/a&gt; (Video)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://bugs.chromium.org/p/project-zero/issues/detail?id=1239&quot;&gt;Samsung: Trustonic t-base TEE does not perform revocation of trustlets&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/CheckPointSW/android_unpacker&quot;&gt;A (hopefully) generic unpacker for packed Android apps&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.antid0te.com/blog.html&quot;&gt;The original elevat0r jailbreak exploit explained&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/Tencent/tinker&quot;&gt;Tinker is a hot-fix solution library for Android, it supports dex, library and resources update without reinstall apk.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://iss.oy.ne.ro/Shattered.pdf&quot;&gt;Shattered Trust: When Replacement Smartphone Components Attack&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/jamie72/IPAPatch&quot;&gt;Patch iOS Apps, The Easy Way, Without Jailbreak&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://b0n1.blogspot.it/2017/08/android-banking-trojan-misuses.html&quot;&gt;Android Banking Trojan misuses accessibility services&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/dweinstein/node-google-play&quot;&gt;Get details and download apps from https://play.google.com by emulating an Android (Nexus 5X) device by default.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://ipads.se.sjtu.edu.cn/lib/exe/fetch.php?media=publicatio&quot;&gt;vTZ: Virtualizing ARM TrustZone&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/sensepost/objection&quot;&gt;objection - runtime mobile exploration&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.xda-developers.com/xposed-nougat-abforce-explained/&quot;&gt;Xposed for Nougat &amp; abforce Submodule Explained, and Why It's Worth Waiting for rovo89's Full Release&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/dxwu/BinderFilter&quot;&gt;A Linux kernel IPC firewall and logger for Android and Binder&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.cs.ox.ac.uk/files/9192/paper-final-woot-imsi.pdf&quot;&gt;White-Stingray: Evaluating IMSI Catchers Detection Applications&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ucsb-seclab/BootStomp&quot;&gt;BootStomp: a bootloader vulnerability finder&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.theverge.com/2017/8/17/16161758/ios-11-touch-id-disable-emergency-services-lock&quot;&gt;iOS 11 has a 'cop button' to temporarily disable Touch ID&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/alephsecurity/abootool&quot;&gt;Simple tool to dynamically discover hidden fastboot OEM commands based on static knowledge&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/abazhaniuk/Publications/blob/master/2017/BlackHat_USA_2017/us-17-Bazhaniuk-Bulygin-BluePill-for-Your-Phone.pdf&quot;&gt;Blue Pill for your Phone&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://android-developers.googleblog.com/2017/08/android-instant-apps-best-practices-for.html&quot;&gt;Android Instant Apps: Best practices for managing download size&lt;/a&gt; (who has played with instant apps yet?)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/xerub/img4lib&quot;&gt;Decrypt the iOS SEP&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://vimeo.com/189449163&quot;&gt;How much does your phone know about you?&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://drive.google.com/file/d/0Bw5_EgjfkDvYd1J5dXF6T3pBZGs/view&quot;&gt;Identifying and Evading Android Protections&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://docs.google.com/presentation/d/1wjHZ0e4_2Hw9tAk-NjKoSZ9HEgpyFiQ-4BDlncQXk2s/edit#slide=id.p&quot;&gt;Breaking Mobile App Protection Mechanisms&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://android-developers.googleblog.com/2017/07/shut-hal-up.html&quot;&gt;Isolation of HALs in Android O&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.wired.com/story/android-antivirus-malware/&quot;&gt;ANTIVIRUS FOR ANDROID HAS A LONG, LONG WAY TO GO&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/jiayy/android_vuln_poc-exp/tree/master/EXP-CVE-2016-3935&quot;&gt;PoC CVE-2016-3935&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/jiayy/android_vuln_poc-exp/tree/master/EXP-CVE-2016-6738&quot;&gt;PoC CVE-2016-6738&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.zimperium.com/fake-snapchat-google-play-store/&quot;&gt;Fake Snapchat in Google Play Store&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://android-developers.googleblog.com/2017/08/next-generation-dex-compiler-now-in.html&quot;&gt;Next-generation Dex Compiler Now in Preview&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.cs.ucr.edu/~krish/usenix17.pdf&quot;&gt;Detecting Android Root Exploits by Learning from Root Providers&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://arxiv.org/pdf/1707.05082.pdf&quot;&gt;Downgrade Attack on TrustZone&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05f-Testing-Local-Authentication.md#user-content-testing-biometric-authentication&quot;&gt;Testing Biometric Authentication&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://census-labs.com/news/2017/08/22/shadow-v2-release/&quot;&gt;shadow v2 public release&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://developer.android.com/about/versions/o/android-8.0-changes.html#security-all&quot;&gt;Android O security changes&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/topjohnwu/Magisk/blob/master/docs/README.MD&quot;&gt;Magisk Documentations&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.lookout.com/sonicspy-spyware-threat-technical-research&quot;&gt;SonicSpy: Over a thousand spyware apps discovered, some in Google Play&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.zscaler.com/blogs/research/mobile-app-wall-shame-sms-touch&quot;&gt;SMS touch sends customer information and SMS messages over a cleartext network&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.zimperium.com/zpi-one-approach-rule/&quot;&gt;ZIMPERIUM blog post that describes how the Zero Packet Inspection (ZPI) approach is trained&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/system-security-group-dam/research/publications/pub2017/WiSec17_ulqinaku.pdf&quot;&gt;Using Hover to Compromise the Confidentiality of User Input
on Android&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/antojoseph/diff-droid&quot;&gt;Various Scripts for Mobile Pen-testing with Frida&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/sektioneins/ipod-serial-adapter&quot;&gt;circuit board (PCB) schematics for 30-pin iPod serial debugging&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/docs/us-17/wednesday/us-17-Kacer-SS7-Attacker-Heaven-Turns-Into-Riot-How-To-Make-Nation-State-And-Intelligence-Attackers-Lives-Much-Harder-On-Mobile-Networks.pdf&quot;&gt;SS7 Attacker Heaven turns into Riot: How to make Nation-State and Intelligence Attackers' lives much harder on mobile networks&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>RE-Canary: Detecting Reverse Engineering with Canary Tokens</title>
 <pubDate>Sat, 05 Aug 2017 18:36:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2017/08/05#re_canary</link>
 <description>
This blog post is to provide some more details about my idea that was mentioned on &lt;a href=&quot;https://risky.biz/RB463/&quot;&gt;Risky Business #463&lt;/a&gt; by Haroon Meer.&lt;br&gt;&lt;br&gt;

What are Canary Tokens (from &lt;a href=&quot;http://blog.thinkst.com/p/canarytokensorg-quick-free-detection.html&quot;&gt;Thinkst&lt;/a&gt;).
&lt;ul&gt;
You'll be familiar with web bugs, the transparent images which track when someone opens an email. They work by embedding a unique URL in a page's image tag, and monitoring incoming GET requests.
&lt;br&gt;&lt;br&gt;
Imagine doing that, but for file reads, database queries, process executions, patterns in log files, Bitcoin transactions or even Linkedin Profile views. Canarytokens does all this and more, letting you implant traps in your production systems rather than setting up separate honeypots.
&lt;br&gt;...&lt;br&gt;
Canary tokens are a free, quick, painless way to help defenders discover they've been breached (by having attackers announce themselves.)
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
The idea: Embed Canary Tokens into binaries (or application data) to help identify reverse engineering of your software.
&lt;br&gt;&lt;br&gt;
Every reverse engineer looks for &lt;i&gt;unique&lt;/i&gt; information (often just &lt;i&gt;strings&lt;/i&gt;) in the target binary to help understand it. The strings are thrown into Google (or other search engines) with the hope to get additional information. The returned information can be extremely helpful to determine what the software is, what other code is linked in, what versions, etc. &lt;b&gt;Everybody who reverse engineers stuff does this!&lt;/b&gt; I personally don't reverse engineer for a living so I asked around to confirm that professionals actually do this (I already knew the answer anyway!).
&lt;br&gt;&lt;br&gt;
The plan:
&lt;ul&gt;
&lt;li&gt;Embed &lt;i&gt;unique looking strings&lt;/i&gt; into the binary&lt;/li&gt;
&lt;li&gt;Stand-up web page that contains the string, log access to that page (alert on access)&lt;/li&gt;
&lt;li&gt;Make Google crawl that page (various tools for that)&lt;/li&gt;
&lt;li&gt;Ship software&lt;/li&gt;
&lt;/ul&gt;
&lt;br&gt;
This is pretty straight forward, right? But do you care about somebody who just ran &lt;i&gt;strings&lt;/i&gt; on your binary?
Likely not! So what's next?
&lt;br&gt;&lt;br&gt;
Many applications protect their code and other assets that come with it through different kinds of methods (called obfuscation techniques for this article - even not all of it will be actual obfuscation).
The next step for the RE-canaries is to generate canaries and embed them into each obfuscation layer.
If someone accesses a more obfuscated canary you know that a certain level of effort was put into reversing your app.
This part is really where the creativity of the RE-canary deployment comes into play. This will be highly depended on the
specific software, on the protection mechanisms used, the language and framework that app is written in and so on.
Mobile apps (I'm a mobile app guy, yeah!) contain API endpoints and URLs and maybe some &lt;i&gt;hardcoded&lt;/i&gt; credentials (tokens of course). The URLs have the advantage that you wouldn't need to put up a website. You just make them accessible and add logging and alerting.
&lt;br&gt;&lt;br&gt;
The final part of this is automation. You want to automate canary creation and embedding into your built process, so that you can generate unique canaries with each built or major release or whatever fits your software.
&lt;br&gt;&lt;br&gt; 
In the end it will likely happen that advanced REs are going to use an anonymization service such as TOR when searching for strings or trying out URLs (specifically for URLs!). 
In this case at least you will know that someone is looking at your
stuff and passed a certain skill/time/effort threshold, which I guess in most cases is enough information.
&lt;br&gt;&lt;br&gt;
That's it! This idea was inspired heavily by Haroon Meer's &lt;A href=&quot;http://canarytokens.org/generate&quot;&gt;Canarytokens&lt;/a&gt; a great free service that I use once in awhile!
&lt;br&gt;&lt;br&gt;
Comments and feedback is welcome via the usual channels. </description>
 </item>
  <item>
 <title>Mobile Security News Update July 2017</title>
 <pubDate>Thu, 13 Jul 2017 13:19:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2017/07/13#mobile_security_news_update_july2017</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://www.blackhat.com/us-17/briefings/schedule/index.html&quot;&gt;Black Hat USA&lt;/a&gt; Las Vegas, July 26-27.
ALL YOUR SMS &amp; CONTACTS BELONG TO ADUPS &amp; OTHERS by Angelos Stavrou, Azzedine Benameur, Ryan Johnson.
NEW ADVENTURES IN SPYING 3G AND 4G USERS: LOCATE, TRACK &amp; MONITOR by Altaf Shaik, Andrew Martin, Jean-Pierre Seifert, Lucca Hirschi, Ravishankar Borgaonkar, Shinjo Park.
SS7 ATTACKER HEAVEN TURNS INTO RIOT: HOW TO MAKE NATION-STATE AND INTELLIGENCE ATTACKERS' LIVES MUCH HARDER ON MOBILE NETWORKS by Martin Kacer, Philippe Langlois.
FIGHTING TARGETED MALWARE IN THE MOBILE ECOSYSTEM by Andrew Blaich, Megan Ruthven.
GHOST TELEPHONIST LINK HIJACK EXPLOITATIONS IN 4G LTE CS FALLBACK by Haoqi Shan, Jun Li, Lin Huang, Qing Yang, Yuwei Zheng.
HONEY, I SHRUNK THE ATTACK SURFACE – ADVENTURES IN ANDROID SECURITY HARDENING by Nick Kralevich.
DEFEATING SAMSUNG KNOX WITH ZERO PRIVILEGE by Di Shen.
BLUE PILL FOR YOUR PHONE by Oleksandr Bazhaniuk, Yuriy Bulygin.
CLOAK &amp; DAGGER: FROM TWO PERMISSIONS TO COMPLETE CONTROL OF THE UI FEEDBACK LOOP by Chenxiong Qian, Simon Pak Ho Chung, Wenke Lee, Yanick Fratantonio.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://defcon.org/html/defcon-25/dc-25-schedule.html&quot;&gt;Defcon&lt;/a&gt; Las Vegas.
Jailbreaking Apple Watch by Max Bazaliy.
Inside the &quot;Meet Desai&quot; Attack: Defending Distributed Targets from Distributed Attacks by CINCVolFLT (Trey Forgety).
macOS/iOS Kernel Debugging and Heap Feng Shui by Min(Spark) Zheng &amp; Xiangyu Liu.
Using GPS Spoofing to Control Time by David &quot;Karit&quot; Robinson.
Phone System Testing and Other Fun Tricks by &quot;Snide&quot; Owen.
Unboxing Android: Everything You Wanted To Know About Android Packers by Avi Bashan &amp; Slava Makkaveev.
Ghost in the Droid: Possessing Android Applications with ParaSpectre by chaosdata.
Ghost Telephonist' Impersonates You Through LTE CSFB by Yuwei Zheng &amp; Lin Huang.
Bypassing Android Password Manager Apps Without Root by Stephan Huber &amp; Siegfried Rasthofer.
Man in the NFC by Haoqi Shan &amp; Jian Yuan.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.usenix.org/conference/woot17/workshop-program&quot;&gt;USENIX Workshop on Offensive Technologies (WOOT)&lt;/a&gt; Vancouver Canada, 14-15 August.
Shattered Trust: When Replacement Smartphone Components Attack by Omer Shwartz, Amir Cohen, Asaf Shabtai, and Yossi Oren.
White-Stingray: Evaluating IMSI Catchers Detection Applications by Shinjo Park and Altaf Shaik, Ravishankar Borgaonkar, Andrew Marti, Jean-Pierre Seifert.
fastboot oem vuln by Roee Hay.
&lt;/ul&gt;

Black Hat and Defcon have a really good number of mobile related talks this year.&lt;br&gt;&lt;br&gt;

It was a busy month and July will be even busier. I'll be at GSMA DSG, Black Hat and Defcon July and Usenix WOOT in mid August&lt;br&gt;&lt;br&gt;

&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;OEM just told Google a bug I submitted isn&amp;#39;t a bug. It is a FULL permement secureboot bypass.&lt;/p&gt;&amp;mdash; Jon Sawyer (@jcase) &lt;a href=&quot;https://twitter.com/jcase/status/883066314541023232&quot;&gt;July 6, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;br&gt;
Picture of month:&lt;br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Liang Chen is demostrating iOS 11.0 beta 2 jailbreak on iPhone 7. &lt;a href=&quot;https://t.co/wA7U9AQ32E&quot;&gt;pic.twitter.com/wA7U9AQ32E&lt;/a&gt;&lt;/p&gt;&amp;mdash; vangelis (@vangelis_at_POC) &lt;a href=&quot;https://twitter.com/vangelis_at_POC/status/878179246207664128&quot;&gt;June 23, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;Br&gt;
There is a lot happening in the Android boot loader world at the moment. I guess this is what happens when the devices get more and more locked down - people go after the root of trust.&lt;br&gt;&lt;br&gt;

Links:
&lt;ul&gt;
&lt;a href=&quot;https://comsecuris.com/blog/posts/luaqemu_bcm_wifi/&quot;&gt;Emulation and Exploration of BCM WiFi Frame Parsing using LuaQEMU&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.zdnet.com/article/encryption-satellite-phones-unscramble-attack-research/?ftag=COS-05-10aaa0g&amp;utm_campaign=trueAnthem:+Trending+Content&amp;utm_content=596044d604d3013cb331b62e&amp;utm_medium=trueAnthem&amp;utm_source=twitter&quot;&gt;New attack can now decrypt satellite phone calls in &quot;real time&quot;&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://koz.io/library-injection-for-debuggable-android-apps/&quot;&gt;Library injection for debuggable Android apps &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;blob:https://framadrop.org/3f180259-7fc3-4234-8b19-6c24fee57206&quot;&gt;Attack TrustZone with Rowhammer&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/aozhimin/MOSEC-2017&quot;&gt;All slides from MOSEC 2017&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.darkreading.com/mobile/researchers-build-firewall-to-deflect-ss7-attacks/d/d-id/1329272?_mc=sm_dr&amp;hootPostID=2931410c7bb8e94e7ed01073fad18f07&quot;&gt;Researchers Build Firewall to Deflect SS7 Attacks&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://source.android.com/security/bulletin/2017-07-01&quot;&gt;Android Security Bulletin - July 2017&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://h1702ctf.com/&quot;&gt;mobile CTF by HackerOne&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://file.digitalinterruption.com/Secure%20Mobile%20Development.pdf&quot;&gt;Secure Mobile Application Development&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.pnfsoftware.com/blog/android-o-and-dex-version-38-new-dalvik-opcodes-to-support-dynamic-invocation/&quot;&gt;ANDROID O AND DEX 38: DALVIK OPCODES FOR DYNAMIC INVOCATION&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://area41.io/downloads/slides/area41_16_ERNW_IMSecure.pdf&quot;&gt;IMSecure - Attacking VoLTE (and other Stuff)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/SigPloiter/SigPloit&quot;&gt;Telecom Signaling Exploitation Framework - SS7, GTP, Diameter &amp; SIP
&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://nbc4i.com/2017/06/07/thieves-caught-hours-after-stealing-gps-tracking-devices-from-tech-company/amp/&quot;&gt;Thieves caught hours after stealing GPS tracking devices from tech company&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://laforge.gnumonks.org/blog/20170616-osmocom_funding/&quot;&gt;How the Osmocom GSM stack is funded&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/OWASP/owasp-mstg/blob/master/Document/0x08-Testing-Tools.md&quot;&gt;OWASP list of the most important security tools for Android and iOS&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.theverge.com/2017/6/13/15794292/ss7-hack-dark-web-tap-phone-texts-cyber-crime&quot;&gt;For $500, this site promises the power to track a phone and intercept its texts&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/as0ler/Android-Tools&quot;&gt;A recopilatory of useful android tools&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://christian.wressnegger.info/content/projects/sidechannels/2017-eurosp.pdf&quot;&gt;Privacy Threats through Ultrasonic Side Channels on Mobile Devices&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.sstic.org/media/SSTIC2017/SSTIC-actes/remote_geolocation_and_tracing_of_subscribers_usin/SSTIC2017-Article-remote_geolocation_and_tracing_of_subscribers_using_4g_volte_android_phone-le-moal_ventuzelo_coudray.pdf&quot;&gt;Subscribers remote geolocation and tracking
using 4G VoLTE enabled Android phone&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://ina.kaist.ac.kr/~dongsuh/paper/kim-ccs15.pdf&quot;&gt;Breaking and Fixing VoLTE:
Exploiting Hidden Data Channels and Mis-implementations&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://securelist.com/dvmap-the-first-android-malware-with-code-injection/78648/&quot;&gt;Dvmap: the first Android malware with code injection&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/Ostorlab/jniostorlab&quot;&gt;JNI method enumeration in ELF files&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://alephsecurity.com/2017/06/07/initroot-moto/&quot;&gt;root shell on Moto G4 &amp; G5 with a Secure Boot and Device Locking Bypass &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.sstic.org/media/SSTIC2017/SSTIC-actes/attacking_samsung_secure_boot/SSTIC2017-Article-attacking_samsung_secure_boot-basse.pdf&quot;&gt;Breaking Samsung Galaxy Secure Boot through Downloaded mode&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/amoulu/TinySmaliEmulator&quot;&gt;A very minimalist smali emulator that could be used to &quot;decrypt&quot; obfuscated strings&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/bunnyblue/AntiVM&quot;&gt;anti vm on android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.fireeye.com/blog/threat-research/2017/05/gaining-root-on-lenovo-vibe.html&quot;&gt;Back That App Up: Gaining Root on the Lenovo Vibe&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ScottyBauer/Android_Kernel_CVE_POCs/commit/0b4721f4c9061f2de2222bff50f6f719864b6a10&quot;&gt;PoCs for Android July bulletin: CVE-2017-8260 CVE-2017-0705 CVE-2017-8259&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.riscure.com/news/secure-initialization-of-tees-when-secure-boot-falls-short&quot;&gt;Secure initialization of TEEs: when secure boot falls short&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.quarkslab.com/reverse-engineering-samsung-s6-sboot-part-ii.html&quot;&gt;Reverse Engineering Samsung S6 SBOOT - Part II&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://proandroiddev.com/no-permission-required-for-sms-verification-in-android-o-761fe2d4f675&quot;&gt;No permission required for SMS verification in Android O&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update June 2017</title>
 <pubDate>Tue, 06 Jun 2017 15:46:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2017/06/06#mobile_security_news_update_june2017</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://www.blackhat.com/us-17/briefings/schedule/index.html&quot;&gt;Black Hat USA&lt;/a&gt; July 26-27 Las Vegas.
'GHOST TELEPHONIST' LINK HIJACK EXPLOITATIONS IN 4G LTE CS FALLBACK by Haoqi Shan, Jun Li, Lin Huang, Qing Yang, Yuwei Zheng.
ALL YOUR SMS &amp; CONTACTS BELONG TO ADUPS &amp; OTHERS by Angelos Stavrou, Azzedine Benameur, Ryan Johnson.
BROADPWN: REMOTELY COMPROMISING ANDROID AND IOS VIA A BUG IN BROADCOM'S WI-FI CHIPSETS by Nitay Artenstein.
CLOAK &amp; DAGGER: FROM TWO PERMISSIONS TO COMPLETE CONTROL OF THE UI FEEDBACK LOOP by Chenxiong Qian, Simon Pak Ho Chung, Wenke Lee, Yanick Fratantonio.
DEFEATING SAMSUNG KNOX WITH ZERO PRIVILEGE by Di Shen.
FIGHTING TARGETED MALWARE IN THE MOBILE ECOSYSTEM by Andrew Blaich, Megan Ruthven.
HONEY, I SHRUNK THE ATTACK SURFACE – ADVENTURES IN ANDROID SECURITY HARDENING by Nick Kralevich.
NEW ADVENTURES IN SPYING 3G AND 4G USERS: LOCATE, TRACK &amp; MONITOR
by Altaf Shaik, Andrew Martin, Jean-Pierre Seifert, Lucca Hirschi, Ravishankar Borgaonkar, Shinjo Park.
SONIC GUN TO SMART DEVICES: YOUR DEVICES LOSE CONTROL UNDER ULTRASOUND/SOUND
by Aimin Pan, Bo Yang, Shangyuan LI, Wang Kang, Zhengbo Wang.
SS7 ATTACKER HEAVEN TURNS INTO RIOT: HOW TO MAKE NATION-STATE AND INTELLIGENCE ATTACKERS' LIVES MUCH HARDER ON MOBILE NETWORKS by Martin Kacer, Philippe Langlois.
THE FUTURE OF APPLEPWN - HOW TO SAVE YOUR MONEY by Timur Yunusov.&lt;br&gt;&lt;br&gt;
(Black Hat has a very strong mobile security line up this year.)
&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://defcon.org/&quot;&gt;Defcon&lt;/a&gt; July 27-30 Las Vegas.
Man in the NFC by Haoqi Shan &amp; Jian Yuan.
(speaker selection not final)
&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://en.mosec.org/&quot;&gt;MOSEC&lt;/a&gt; June, Shanghai added a bunch of talks (all mobile security related, obviously).
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://recon.cx/2017/montreal/&quot;&gt;Recon&lt;/a&gt; June 16-18 Montreal, Canada.
FreeCalypso: a fully liberated GSM baseband by Mychaela Falconia.
Hacking Cell Phone Embedded Systems by Keegan Ryan.
&lt;/ul&gt;

This took a long time again. It gets harder and harder do to this since this stuff is not directly what I do on
a day to day basis currently.&lt;br&gt;&lt;br&gt;

The Qualcomm Mobile Security summit was excellent again! Fantastic talks and again I met a bunch of people I mostly knew from email and/or twitter or haven't seen in quite some time. This conference still is unparalleled!&lt;br&gt;&lt;br&gt;

I had a minute to play with the BlackBerry KeyOne and it feels like a super solid device. The screen is bigger then I thought it would be and this makes the device almost too big for my taste - but this is hard to say from playing with it for just a minute.&lt;br&gt;&lt;br&gt;

So iOS will finally support NDEF tags.&lt;br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Detect NFC tags on iOS 11.0! &lt;a href=&quot;https://t.co/70szXo1yny&quot;&gt;pic.twitter.com/70szXo1yny&lt;/a&gt;&lt;/p&gt;&amp;mdash; Aaron (@iosaaron) &lt;a href=&quot;https://twitter.com/iosaaron/status/871830879881928704&quot;&gt;June 5, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;

This talk is really interesting for anybody interested in mobile application security. This is not about mobile app reverse engineering but about app, backend, phone infrastructure interaction.
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Previously top secret &lt;a href=&quot;https://twitter.com/hashtag/TR16?src=hash&quot;&gt;#TR16&lt;/a&gt; talk on pwning Uber &amp;amp; Lyft (w/ live demos!) by &lt;a href=&quot;https://twitter.com/vlad_penetrator&quot;&gt;@vlad_penetrator&lt;/a&gt; &amp;amp; &lt;a href=&quot;https://twitter.com/gramx&quot;&gt;@gramx&lt;/a&gt; is finally out! &lt;a href=&quot;https://t.co/cqtAC69p7w&quot;&gt;https://t.co/cqtAC69p7w&lt;/a&gt;&lt;/p&gt;&amp;mdash; Kelly Shortridge (@swagitda_) &lt;a href=&quot;https://twitter.com/swagitda_/status/869868679206514688&quot;&gt;May 31, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;

Pictures of the month:
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Some old PalmOS devices on street in my hood &amp;lt;3 &lt;a href=&quot;https://t.co/gkePP0Uzd8&quot;&gt;pic.twitter.com/gkePP0Uzd8&lt;/a&gt;&lt;/p&gt;&amp;mdash; Collin Mulliner (@collinrm) &lt;a href=&quot;https://twitter.com/collinrm/status/868621352151986181&quot;&gt;May 28, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;Br&gt;

&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;A Symbian phone appears &lt;a href=&quot;https://twitter.com/hashtag/QPSISummit2017?src=hash&quot;&gt;#QPSISummit2017&lt;/a&gt; &lt;a href=&quot;https://t.co/MFHiAEKl4T&quot;&gt;pic.twitter.com/MFHiAEKl4T&lt;/a&gt;&lt;/p&gt;&amp;mdash; Collin Mulliner (@collinrm) &lt;a href=&quot;https://twitter.com/collinrm/status/865325986593652737&quot;&gt;May 18, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;Br&gt;

&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;So basically set your smartphone&amp;#39;s name to %x%x%x%x and test for format string vulns in connected devices . here&amp;#39;s a 2011 BMW 330i &lt;a href=&quot;https://twitter.com/hashtag/Hackers?src=hash&quot;&gt;#Hackers&lt;/a&gt; &lt;a href=&quot;https://t.co/vhLKRnKYud&quot;&gt;pic.twitter.com/vhLKRnKYud&lt;/a&gt;&lt;/p&gt;&amp;mdash; Eهاb  Huسein (@__Obzy__) &lt;a href=&quot;https://twitter.com/__Obzy__/status/864704956116254720&quot;&gt;May 17, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;Br&gt;

Links
&lt;ul&gt;
&lt;A href=&quot;http://www.ieee-security.org/TC/SPW2017/MoST/&quot;&gt;Papers and Slides from MOBILE SECURITY TECHNOLOGIES (MOST) 2017&lt;/a&gt; an Academic Workshop&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://source.android.com/security/bulletin/2017-06-01&quot;&gt;Android Security Bulletin - June 2017&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/nccgroup/LazyDroid&quot;&gt;LazyDroid - bash script to facilitate some aspects of an Android application assessment&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.droidsec.org/nexus/&quot;&gt;factory and OTA images for Nexus devices&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://bugs.chromium.org/p/project-zero/issues/detail?id=1167&quot;&gt;Android: Multiple Android devices do not revoke QSEE trustlets&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/assolini/status/871845164582567936&quot;&gt;Brazilian phishers are now asking for victim's IMEI in their fake bank pages, aiming to steal their accounts via mobile access&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://ioshacker.com/news/ios-11-features-apple-didnt-announce&quot;&gt;50+ iOS 11 Features Apple Didn't Announce On Stage [List]&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/SfyLabs/status/871483050596737024&quot;&gt;Android Mazar 3.0 targets 41 banking apps&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.bleepingcomputer.com/news/security/google-publishes-list-of-42-phones-running-latest-android-security-updates/&quot;&gt;Google Publishes List of 42 Phones Running Latest Android Security Updates&lt;/a&gt; 42 is not a lot!&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://seaglass.cs.washington.edu/&quot;&gt;City-Wide IMSI-Catcher Detection&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://android-developers.googleblog.com/2017/06/2017-android-security-rewards.html&quot;&gt;Up to $200,000 for Android exploits!&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.ieee-security.org/TC/SPW2017/MoST/proceedings/OHanlon_MoST17.pdf&quot;&gt;Mobile subscriber WiFi privacy (WiFi IMSI catcher!!)&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/felixgr/secure-ios-app-dev&quot;&gt;Collection of the most common vulnerabilities found in iOS applications&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.androidpolice.com/2017/05/21/android-o-feature-spotlight-android-tells-app-displaying-screen-overlay/&quot;&gt;Android O feature spotlight: Android tells you if an app is displaying a screen overlay&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://qct-qualcomm.secure.force.com/QCTConference/servlet/servlet.FileDownload?file=015a0000002ncW4&quot;&gt;Priorities for Securing the Mobile Ecosystem&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://cloak-and-dagger.org/&quot;&gt;Cloak &amp; Dagger&lt;/a&gt; Android Overlay attacks&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://docs.google.com/presentation/d/1TY1LzrdA3zQEt9PkzUP61NF--GyFN1mPnFGr9o5U2Mw/edit#slide=id.p&quot;&gt;Cloak &amp; Dagger&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.youtube.com/watch?v=BmXaMaxx7OY&quot;&gt;Cloak &amp; Dagger talk&lt;/a&gt;(youtube)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://qct-qualcomm.secure.force.com/QCTConference/servlet/servlet.FileDownload?file=015a0000002ncVu&quot;&gt;Honey, I Shrunk the Attack Surface Adventures in Android Security Hardening&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://qct-qualcomm.secure.force.com/QCTConference/servlet/servlet.FileDownload?file=015a0000002ncVz&quot;&gt;With great speed comes great leakage - How processor performance is tied to side-channel leakage&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://qct-qualcomm.secure.force.com/QCTConference/servlet/servlet.FileDownload?file=015a0000002ncWJ&quot;&gt;Pwning the Nexus of Every Pixel&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://alephsecurity.com/2017/05/23/nexus6-initroot/&quot;&gt;initroot: Bypassing Nexus 6 Secure Boot through Kernel Command-line Injection&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.elcomsoft.com/2017/05/android-encryption-demystified/&quot;&gt;Android Encryption Demystified&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.idownloadblog.com/2017/05/23/iphone-7-plus-stable-jailbreak-ios-1011-extra_recipe-yalux/&quot;&gt;iPhone 7 and 7 Plus get a stable jailbreak on iOS 10.1.1 with extra_recipe+yaluX&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://census-labs.com/news/2017/04/18/infiltrate-2017/&quot;&gt;The Shadow over Android&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://support.google.com/googleplay/android-developer/answer/7384423&quot;&gt;Apparently Google Play Store can now manage your app signing keys, and 'opt-in is permanent&lt;/a&gt; (via Nikolay Elenkov)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://web.securityinnovation.com/hubfs/iOS%20Hacking%20Guide.pdf?utm_content=buffere1776&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer&quot;&gt;Hacking iOS Applications a detailed testing guide&lt;/a&gt; (doc)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.group-ib.com/cron&quot;&gt;Android malware that infected 3500 devices/day&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://bugs.chromium.org/p/project-zero/issues/list?can=1&amp;q=owner%3Aianbeer+modified-after%3A2017%2F5%2F22&amp;colspec=ID+Type+Status+Priority+Milestone+Owner+Summary&amp;cells=ids&quot;&gt;iOS/macOS bugs slaughter list by P0's Ian Beer&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://media.ccc.de/v/biometrie-s8-iris-en&quot;&gt;Hacking the Samsung Galaxy S8 Irisscanner &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/brandonasuncion/Reverse-Engineering-Bluetooth-Protocols&quot;&gt;Learning about Bluetooth protocols and reverse-engineering them.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.droidsec.org/blogs/2017/05/22/a-simple-tool-for-linux-kernel-audits.html&quot;&gt;A Simple Tool for Linux Kernel Audits&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.slashgear.com/google-vs-root-why-safetynet-is-now-standard-for-developers-19485690/&quot;&gt;Google VS Root: Why SafetyNet is now standard for developers&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://support.google.com/googleplay/android-developer/answer/7353455&quot;&gt;Google Play can now restrict app distribution based on SafetyNet Attestation results, SoC vendor etc&lt;/a&gt; (via John Kozyrakis)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.tomshardware.com/news/us-senate-adopts-signal-https,34437.html&quot;&gt;US Senate Adopts Signal, HTTPS A Year After Trying To Kill Encryption&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://spectrum.ieee.org/tech-talk/telecom/security/alarming-security-defects-in-ss7-the-global-cellular-networkand-how-to-fix-them&quot;&gt;Alarming Security Defects in SS7, the Global Cellular Network - and How to Fix Them&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/saelo/ios-kern-utils&quot;&gt;iOS Kernel utilities&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://motherboard.vice.com/en_us/article/dutch-cops-bust-another-pgp-blackberry-company-for-alleged-money-laundering?utm_content=buffer6787c&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer&quot;&gt;Dutch Cops Bust Another PGP BlackBerry Company for Alleged Money Laundering&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://labs.mwrinfosecurity.com/advisories/&quot;&gt;Multiple MediaTek vulnerabilities&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.onthewire.io/google-working-on-fix-for-android-permission-weakness/&quot;&gt;Google Working on Fix for Android Permission Weakness&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://arstechnica.com/security/2017/05/theres-a-spike-in-android-apps-that-covertly-listen-for-inaudible-sounds-in-ads/&quot;&gt;More Android phones than ever are covertly listening for inaudible sounds in ads&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.vantagepoint.sg/blog/90-the-jiu-jitsu-of-detecting-frida&quot;&gt;The Jiu-Jitsu of Detecting Frida&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://arstechnica.com/security/2017/05/thieves-drain-2fa-protected-bank-accounts-by-abusing-ss7-routing-protocol/&quot;&gt;Thieves drain 2fa-protected bank accounts by abusing SS7 routing protocol&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://autoroot.chainfire.eu/&quot;&gt;Over 100 CF-Auto-Roots were updated by ChainfireXDA&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://source.android.com/security/bulletin/2017-05-01&quot;&gt;Android Security Bulletin - May 2017&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/cryptax/misc-code/blob/master/r2ztorg.py&quot;&gt;de-obfuscate Android Ztorg obfuscated strings&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/#.WQNDUIjP-pk.twitter&quot;&gt;Android Applications Reversing 101&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/xxv/android-lifecycle&quot;&gt;A diagram of the Android Activity / Fragment lifecycle&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/SfyLabs/status/871484588178239490&quot;&gt;Example of a powerful overlay attack executed by Android banker&lt;/a&gt; (video)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://handstandsam.com/2017/05/04/identifying-an-android-device/&quot;&gt;Identifying an Android Device - Available Identifiers&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://developer.akamai.com/blog/2017/05/19/diving-deeper-google-io-part-1/&quot;&gt;Diving Deeper into Android O&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.peerlyst.com/posts/how-to-put-any-android-smartphone-into-monitor-mode-using-custom-script-without-bcmon-kali-linux&quot;&gt;How To Put Any Android Smartphone Into Monitor Mode Using Custom Script Without bcmon&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/CalebFenton/apkfile&quot;&gt;Android app analysis and feature extraction library&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://pentestcorner.com/introduction-to-fridump/&quot;&gt;Introduction to Fridump&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.fastcompany.com/40407424/smartphone-apps-are-tracking-you-and-heres-how-to-monitor-what-they-know&quot;&gt;Here's How To Track The Smartphone Apps That Are Tracking You&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2017/may/assethook-a-redirector-for-android-asset-files-using-old-dogs-and-modern-tricks/&quot;&gt;AssetHook: A Redirector for Android Asset Files Using Old Dogs and Modern Tricks&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ac-pm/Inspeckage&quot;&gt;Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/sh4hin/MobileApp-Pentest-Cheatsheet&quot;&gt;The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://eprint.iacr.org/2016/980.pdf&quot;&gt;TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://chao-tic.github.io/blog/2017/05/24/dirty-cow&quot;&gt;Dirty COW and why lying is bad even if you are the Linux kernel&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://scottyab.com/2017/05/how-to-build-and-integrate-openssl-into-your-android-ndk-project/&quot;&gt;How to build and integrate OpenSSL into your Android NDK project&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://developer.apple.com/documentation/devicecheck?changes=latest_minor&quot;&gt;iOS DeviceCheck. Access per-device, per-developer data that your associated server can use in its business logic.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://android-developers.googleblog.com/2016/07/changes-to-trusted-certificate.html&quot;&gt;Changes to Trusted Certificate Authorities in Android Nougat&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>iOS WebView Dialer Fixed</title>
 <pubDate>Wed, 10 May 2017 13:28:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2017/05/10#ios_webview_auto_dialer_fixed</link>
 <description>
In November 2016 I wrote a post about the &lt;a href=&quot;https://www.mulliner.org/blog/blosxom.cgi/security/ios_webview_auto_dialer.html&quot;&gt;iOS WebView Auto Dialer bug&lt;/a&gt;
specifically in the iOS Twitter and the iOS LinkedIn apps. Last weekend I finally had the time to retest those apps to see if the bug was fixed. Retests in December and January showed the bug was still present (as far as I remember). Both apps are fixed now!
&lt;br&gt;&lt;br&gt;
Playing around with this a bit more I discovered a new security warning on iOS. There now seems to be a detection for the case where a website
automatically tries to open a TEL URL. The dialog doesn't always appear but when it does you first have to click &lt;i&gt;allow&lt;/i&gt; before being presented with the actual Call/Cancel dialog. Neat!
&lt;br&gt;&lt;br&gt;
&lt;img src=&quot;/images/dialwarn.jpg&quot; width=&quot;50%&quot;&gt;
&lt;br&gt;&lt;br&gt;
The conclusion seems to be that the bug was fixed and that they added a new detection and warning dialog. Good!</description>
 </item>
  <item>
 <title>Mobile Security News Update April 2017</title>
 <pubDate>Tue, 25 Apr 2017 16:57:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2017/04/25#mobile_security_news_update_april_2017</link>
 <description>
Conferences
&lt;ul&gt;
&lt;A href=&quot;https://www.blackhat.com/us-17/briefings/schedule/index.html&quot;&gt;Black Hat USA&lt;/A&gt; July 22-27 Las Vegas.
BROADPWN: REMOTELY COMPROMISING ANDROID AND IOS VIA A BUG IN BROADCOM'S WI-FI CHIPSETS by Nitay Artenstein.
(Program not complete)
&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://www.syscan360.org/en/speakers/&quot;&gt;SyScan360&lt;/a&gt; May 30-31 Seattle.
Exploit iOS 9.x Userland with LLDB JIT by Wei Wang.
The wounded android WIFI driver New attack surface in cfg80211 by Hao Chen.
&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://en.mosec.org/&quot;&gt;MOSEC&lt;/a&gt; June, Shanghai. Revisiting the Kernel Security Enhancements in iOS 10 AND Pwning Apple Watch. (Program still not complete)
&lt;/ul&gt;

&lt;br&gt;
&lt;br&gt;
Recordings for the first OsmoCon are available &lt;a href=&quot;https://media.ccc.de/c/osmocon17&quot;&gt;here&lt;/a&gt;. OsmoCon is,
of course, a conference about the OsmoCom projects!
&lt;br&gt;&lt;Br&gt;

Android O news: will prompt for pin/passcode before enabling developer options, further
&lt;a href=&quot;https://android-developers.googleblog.com/2017/04/changes-to-device-identifiers-in.html&quot;&gt;Android O changes device identifiers&lt;/a&gt; and how to access them.&lt;br&gt;&lt;br&gt;

If you are interested in mobile backing Trojans you should follow Lukas Stefanko:
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;[Research] Lately discovered another Mobile Banking Trojan on &lt;a href=&quot;https://twitter.com/hashtag/GooglePlay?src=hash&quot;&gt;#GooglePlay&lt;/a&gt; with up to 5,000 installs. &lt;a href=&quot;https://twitter.com/hashtag/Malware?src=hash&quot;&gt;#Malware&lt;/a&gt;&lt;a href=&quot;https://t.co/rcgmGr2Kgo&quot;&gt;https://t.co/rcgmGr2Kgo&lt;/a&gt; &lt;a href=&quot;https://t.co/wW4lNsoCAn&quot;&gt;pic.twitter.com/wW4lNsoCAn&lt;/a&gt;&lt;/p&gt;&amp;mdash; Lukas Stefanko (@LukasStefanko) &lt;a href=&quot;https://twitter.com/LukasStefanko/status/854686235746586624&quot;&gt;April 19, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;br&gt;

Somebody &lt;i&gt;released&lt;/i&gt; the source code of FlexiSpy (mobile phone spyware) to the public. The release notes are
here: &lt;a href=&quot;https://pastebin.com/raw/i81F1nN9&quot;&gt;readme.txt&lt;/a&gt;.
The download is here: &lt;A href=&quot;https://mega.nz/#!AmZEjbrb!nehl_WgZAkkh9fuh_RSV8-KncLxW70eP83tEWsnq2EE&quot;&gt;FlexiSpyOmni.zip&lt;/a&gt;, collection of all data is here: &lt;a href=&quot;https://github.com/Te-k/flexidie&quot;&gt;Source code and binaries of FlexiSpy from the Flexidie dump&lt;/a&gt; and a writeup of the dump is here: &lt;a href=&quot;http://www.cybermerchantsofdeath.com/blog/2017/04/23/FlexiSpy.html&quot;&gt;FlexSpy Application Analysis&lt;/A&gt;. I bet we will see more details in the coming weeks!
&lt;br&gt;&lt;Br&gt;

Does Blackberry give out review samples for the &lt;a href=&quot;http://www.blackberrymobile.com/us/&quot;&gt;KEYone&lt;/a&gt;? I would really like one and give it a try (would post full review here of course!).
&lt;br&gt;&lt;Br&gt;

&lt;img src=&quot;https://pbs.twimg.com/media/C8b8mS2UwAAv4Px.jpg:large&quot; width=&quot;70%&quot;&gt;&lt;br&gt;All Nokia phones ever made.&lt;br&gt;&lt;br&gt;

&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;&amp;quot;With this code quality, I don&amp;#39;t think that&amp;#39;s a good move&amp;quot; -- &lt;a href=&quot;https://twitter.com/esizkur&quot;&gt;@esizkur&lt;/a&gt; on Chinese baseband explo{rat,oit}ion &lt;a href=&quot;https://twitter.com/hashtag/youkillityoueatit?src=hash&quot;&gt;#youkillityoueatit&lt;/a&gt; &lt;a href=&quot;https://t.co/nkhuR1KPs2&quot;&gt;pic.twitter.com/nkhuR1KPs2&lt;/a&gt;&lt;/p&gt;&amp;mdash; Morgan Marquis-Boire (@headhntr) &lt;a href=&quot;https://twitter.com/headhntr/status/850080440954347521&quot;&gt;April 6, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
Yo Ralf where the slides at?&lt;br&gt;&lt;br&gt;

&lt;br&gt;
Links
&lt;ul&gt;
&lt;a href=&quot;https://github.com/akibsayyed/safeseven&quot;&gt;ss7 assessment tool&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ernw/ss7MAPer&quot;&gt;ss7 map testing tool&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://speakerdeck.com/mbazaliy/fried-apples-jailbreak-diy&quot;&gt;Fried Apples&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.theverge.com/2017/3/31/15136226/samsung-galaxy-s8-face-scan-security&quot;&gt;The Galaxy S8's facial scanner can, unsurprisingly, be tricked with a photo&lt;/a&gt; (Biometrics are convenience not security)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://newandroidbook.com/tools/jtrace.html&quot;&gt;jtrace - augmented, Android aware strace&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/docs/asia-17/materials/asia-17-Balduzzi-Mobile-Telephony-Threats-In-Asia.pdf&quot;&gt;Mobile Telephony Threats in Asia&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://theroot.ninja/download.html&quot;&gt;Sunshine update&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://support.apple.com/en-us/HT207688&quot;&gt;Security updates in iOS 10.3.1&lt;/a&gt; a lot of webkit and kernel bugs&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-android-technical-analysis.pdf&quot;&gt;Pegasus for Android&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/docs/asia-17/materials/asia-17-Bai-3G-4G-Intranet-Scanning-And-Its-Application-On-The-WormHole-Vulnerability.pdf&quot;&gt;3G/4G Intranet Scanning&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blogs.securiteam.com/index.php/archives/3037&quot;&gt;Know your community - Stefan Esser&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/commoncriteria/mobile-device&quot;&gt;Protection Profile for Mobile Device Fundamentals&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.flanker017.me/cve-2017-2416-gif-remote-exec/&quot;&gt;CVE-2017-2416 Remote code execution triggered by malformed GIF in ImageIO framework, affecting most iOS/macOS apps&lt;/a&gt; (blog post)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://arxiv.org/pdf/1702.04434.pdf&quot;&gt;Easy 4G/LTE IMSI Catchers for Non-Programmers&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.vantagepoint.sg/blog/89-more-android-anti-debugging-fun&quot;&gt;More Android Anti-Debugging Fun&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.timac.org/?p=1707&quot;&gt;Analysis of the Facebook.app for iOS [v. 87.0]&lt;/a&gt; (blog post)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html&quot;&gt;Over The Air: Exploiting Broadcom's Wi-Fi Stack (Part 1)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_11.html&quot;&gt;Over The Air: Exploiting Broadcom's Wi-Fi Stack (Part 2)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://usmile.at/symposium/program&quot;&gt;Slides for the Android Security Symposium 2017&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://conference.hitb.org/hitbsecconf2017ams/materials/D1T2%20-%20JeongHoon%20Shin%20-%20Femotcell%20Hacking.pdf&quot;&gt;FemotoCell Hacking&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://xerub.github.io/ios/kpp/2017/04/13/tick-tock.html&quot;&gt;iOS Kernel Integrity Protection bypass via Tick (FPU) Tock (IRQ)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.guardsquare.com/en/blog/dexguard-vs-proguard&quot;&gt;DexGuard vs. ProGuard&lt;/a&gt; (WARNING: post is by a app protection company)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://fortune.com/2017/04/19/bose-headphones-privacy/&quot;&gt;Bose headphones secretly data-mine users if they have the app installed on their phone!&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://articles.forensicfocus.com/2017/04/18/cellular-provider-record-retention-periods/&quot;&gt;Cellular Provider Record Retention Periods&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/Fuzion24/AndroidKernelExploitationPlayground&quot;&gt;AndroidKernelExploitationPlayground&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.eshard.com/wp-content/plugins/email-before-download/download.php?dl=9465aa084ff0f070a3acedb56bcb34f5&quot;&gt;Attack TrustZone with Rowhammer&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/libimobiledevice/libplist/releases/tag/2.0.0&quot;&gt;libmobiledevice 2.0&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://conference.hitb.org/hitbsecconf2017ams/materials/D2T4%20-%20Emmanuel%20Gadaix%20-%20A%20Surprise%20Encounter%20With%20a%20Telco%20APT.pdf&quot;&gt;A surprise encounter with a telco APT&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://census-labs.com/media/shadow-infiltrate-2017.pdf&quot;&gt;The Shadow over Android Heap exploitation assistance for Android's libc allocator&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://source.android.com/security/reports/zer0-conf-2017-Your-Move.pdf&quot;&gt;Vulnerability Exploitation and Mitigation in Android&lt;/a&gt; (slides by Google)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://facebook.github.io/stetho/&quot;&gt;Stetho: A debug bridge for Android applications&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://bristolcrypto.blogspot.gr/2017/04/is-your-banking-app-secure.html&quot;&gt;Why Banker Bob (still) Can't Get TLS Right: A Security Analysis of TLS in Leading UK Banking Apps&lt;/a&gt; (blog post + paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://calebfenton.github.io/2017/04/14/calling_jni_functions_with_java_object_arguments_from_the_command_line/&quot;&gt;Calling JNI Functions with Java Object Arguments from the Command Line&lt;/a&gt; (blog post)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.slideshare.net/CanSecWest/csw2017-geshevmiller-logic-bug-hunting-in-chrome-on-android&quot;&gt;Logic Bug Hunting in Chrome on Android&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://fbredex.com/&quot;&gt;Redex and Android byteCode optimizer&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://dpnishant.github.io/appmon/&quot;&gt;AppMon is an automated framework for monitoring and tampering system API calls of native apps on macOS, iOS and Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://source.android.com/security/bulletin/2017-04-01&quot;&gt;Android Security Bulletin - April 2017&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://android.googlesource.com/platform/test/vts/&quot;&gt;Android Vendor Test Suite (VTS)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.virqdroid.com/2017/04/mobile-security-research-2017-q1.html&quot;&gt;Mobile Security Research - 2017 Q1&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.hackingarticles.in/forensics-investigation-of-android-phone-using-andriller/&quot;&gt;Forensics Investigation of Android Phone using Andriller&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://koz.io/using-frida-on-android-without-root/&quot;&gt;Using Frida on Android without root&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://medium.com/genymobile/gnirehtet-reverse-tethering-android-2afacdbdaec7&quot;&gt;Introducing 'gnirehtet', a reverse tethering tool for Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://arstechnica.com/tech-policy/2017/04/secure-messaging-app-confide-sued-over-alleged-security-flaws/?utm_source=dlvr.it&amp;utm_medium=twitter&quot;&gt;Man sues Confide: I wouldn't have spent $7/month if I'd known it was flawed&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://labs.nettitude.com/blog/ios-and-android-runtime-and-anti-debugging-protections/&quot;&gt;Who owns your runtime?&lt;/a&gt;&lt;br&gt;&lt;br&gt;
 &lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update March 2017 part2</title>
 <pubDate>Tue, 28 Mar 2017 15:21:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2017/03/28#mobile_security_news_update_March2017_p2</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://qct-qualcomm.secure.force.com/QCTConference/GenericSitePage?eventname=2017Security&amp;page=Summit%20Information&quot;&gt;Qualcomm Mobile Security Summit 2017&lt;/a&gt; San Diego, May. All talks are on mobile security - super strong lineup!&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://2017.appsec.eu/program/&quot;&gt;AppSec EU&lt;/a&gt; May 11-12, Belfast. 
How to steal mobile wallet? - Mobile contactless payments apps attack and defense. Fixing Mobile AppSec: The OWASP Mobile Project.&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://en.mosec.org/&quot;&gt;MOSEC&lt;/a&gt; June Shanghai. 
Pwning Apple Watch. (program not complete yet!)
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.offensivecon.org/&quot;&gt;OffensiveCon&lt;/a&gt; is a new security conference in Berlin Germany focused on Offense. No details yet but they chose the right location for sure.&lt;br&gt;&lt;br&gt;

For everybody who didn't make it to the Android Security Symposium, they recorded the talks and the videos are available: &lt;a href=&quot;https://www.youtube.com/playlist?list=PL61IkVbNYniXoAXEFtftfElcSDNZoCLpe&quot;&gt;here&lt;/a&gt;.&lt;br&gt;&lt;br&gt;

Google published a &lt;a href=&quot;https://security.googleblog.com/2017/03/diverse-protections-for-diverse.html&quot;&gt;blog post&lt;/a&gt; and a detailed 
&lt;a href=&quot;https://static.googleusercontent.com/media/source.android.com/en//security/reports/Google_Android_Security_2016_Report_Final.pdf&quot;&gt;report on Android Security in 2016&lt;/a&gt;. The report covers everything from patching and update stats to high impact vulnerabilities. People posted a lot of summaries but you should really read it yourself if
you work with Android.&lt;br&gt;&lt;Br&gt;

&lt;A href=&quot;http://www.androidpolice.com/2017/03/10/google-pulls-march-security-update-nexus-6-breaks-safetynet-android-pay/&quot;&gt;Google pulls March security update for Nexus 6, after it breaks SafetyNet and Android Pay&lt;/a&gt;. This was pretty interesting, not the fact that they &lt;i&gt;broke&lt;/i&gt; SafetyNet but that they broke it for their own devices (Nexus). This happened to some really small manufacturer before and if you have an idea of how SN works on the backend - it is clear what happened.&lt;br&gt;&lt;Br&gt;

&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;execute USSD codes in iOS 10.2.xx --bug-Impact: Tapping a tel link in a PDF document could trigger a call without prompting the user &lt;a href=&quot;https://twitter.com/hashtag/lol?src=hash&quot;&gt;#lol&lt;/a&gt;&lt;/p&gt;&amp;mdash; Ravishankar Borgaonk (@raviborgaonkar) &lt;a href=&quot;https://twitter.com/raviborgaonkar/status/846506620121202688&quot;&gt;March 27, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Android anti-debugging tricks can be patented? This is stupid in so many ways &lt;a href=&quot;https://t.co/IjXfg45xoN&quot;&gt;https://t.co/IjXfg45xoN&lt;/a&gt;&lt;/p&gt;&amp;mdash; Bernhard Mueller (@muellerberndt) &lt;a href=&quot;https://twitter.com/muellerberndt/status/845575691991040000&quot;&gt;March 25, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;

Links
&lt;ul&gt;
&lt;a href=&quot;http://www.vantagepoint.sg/blog/88-anti-debugging-fun-with-android-art&quot;&gt;Anti Debugging fun Android Art&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://pegaswitch.com/&quot;&gt;PageSwitch an exploit toolkit for the Nintendo switch&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://arstechnica.com/security/2017/03/ransomware-scammers-exploited-safari-bug-to-extort-porn-viewing-ios-users/&quot;&gt;Ransomware scammers exploited Safari bug to extort porn-viewing iOS users&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.slideshare.net/Codemotion/increasing-android-app-security-for-free-roberto-gassir-roberto-piccirillo-codemotion-milan-2016&quot;&gt;Increasing Android app security for free&lt;/a&gt;i (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://duo.com/blog/looking-back-at-android-in-2016&quot;&gt;Looking Back at Android Security in 2016 by DuoSecurity&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md&quot;&gt;OWASP Mobile - Anti Reversing Checks&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.fortinet.com/2017/03/15/teardown-of-a-recent-variant-of-android-ztorg-part-1&quot;&gt;Android/Ztorg teardown -  It detects the Android SDK emulator, but also emulators from Genymotion, Bluestacks and BuilDroid. It also detects tainted environments. Several of its checks will be difficult to bypass&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://alephsecurity.com/2017/03/26/oneplus3t-adb-charger/&quot;&gt;Owning OnePlus 3/3T with a Malicious Charger&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.apple.com/business/docs/iOS_Security_Guide.pdf&quot;&gt;The updated iOS Security Guide now covers iOS 10&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://support.apple.com/en-us/HT207617&quot;&gt;iOS 10.3 fixes a large number of Kernel and WebKit bugs&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.apk-deguard.com/&quot;&gt;Statistical Deobfuscation for Android&lt;/a&gt; (I suppose this is for Dex code only)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.codemetrix.net/hacking-android-apps-with-frida-2/&quot;&gt;Hacking Android Apps with Frida (part 2)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://consumerist.com/2017/01/27/nexus-5x-owners-say-device-boot-looping-kills-phones-get-runaround-from-lg/&quot;&gt;Nexus 5X Owners Say Device Boot-Looping Kills Phones; Getting Runaround From LG&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.forbes.com/sites/thomasbrewster/2017/03/22/iphone-android-malware-from-las-vegas-in-russia-cybercrime-links/#515ada892a8a&quot;&gt;This American Surveillance Tool Helped Russians Spy On Androids And iPhones&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://9to5mac.com/2017/03/07/apple-cracks-down-on-hot-push-code-sdks/&quot;&gt;Apple cracking down on developers who use SDKs like Rollout to update apps without App Store approval&lt;/a&gt; (Apple going after hot-patching frameworks)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://alephsecurity.com/2017/03/08/nexus9-fiq-debugger/&quot;&gt;Attacking Nexus 9 with Malicious Headphones&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.gsma.com/aboutus/leadership/committees-and-groups/working-groups/fraud-security-group/gsma-coordinated-vulnerability-disclosure-programme&quot;&gt;GSMA Coordinated Vulnerability Disclosure Program&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/nelenkov/gdrive-appdata&quot;&gt;gdrive-appdata: Tries to fetch the contents of the appdata hidden folder from Google Drive.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://laforge.gnumonks.org/blog/20170321-telcosecday-2017/&quot;&gt;Harald Welte about TelcoSecDay 2017 @ Troopers&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://android.googlesource.com/platform/bionic/+/master/android-changes-for-ndk-developers.md#Writable-and-Executable-Segments-Enforced-for-API-level-26&quot;&gt;NDK changes for API level 26&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://android-developers.googleblog.com/2017/03/first-preview-of-android-o.html&quot;&gt;O-MG, the Developer Preview of Android O is here!&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://developer.android.com/sdk/api_diff/o-dp1/changes.html&quot;&gt;Android API Differences Report&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.att.com/offers/call-protect.html&quot;&gt;Frustrated by robo callers &amp; an AT&amp;T subscriber?  Get the AT&amp;T call protect app&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://arstechnica.com/gadgets/2017/03/samsung-commits-to-monthly-security-updates-for-unlocked-us-smartphones/&quot;&gt;Samsung commits to monthly security updates for unlocked US smartphones&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.appbrain.com/stats/top-android-phones&quot;&gt;Android phone market stats&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.msn.com/en-gb/money/technology/20-bestselling-mobile-phones-of-all-time/ss-AAh57Qt#image=1&quot;&gt;20 bestselling mobile phones of all time&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ScottyBauer/Android_Kernel_CVE_POCs/commit/a9e71a13034d283d9bf0fb909039e99285c6db89&quot;&gt;Android Kernel CVE PoCs&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.proofpoint.com/us/threat-insight/post/mobile-malware-masquerades-as-POS-management-app&quot;&gt;Mobile Malware Masquerades as POS Management App&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://judge.rednaga.io/&quot;&gt;Judge an Android malware scanner by rednaga.io (@timstrazz and @caleb_fenton)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.youtube.com/watch?time_continue=1&amp;v=QpaeneaNEbw&quot;&gt;The Art Of Bootloader Unlocking: Exploiting Samsung S-Boot&lt;/a&gt; (video from nullcon talk)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.slideshare.net/CanSecWest/csw2016-chaykin-havingfunwithsecuremessengersandandroidwear&quot;&gt;Having fun with Secure Messengers and Android Wear&lt;/a&gt;i (slides CansecWest 2017)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.slideshare.net/CanSecWest/qidan-hegengming-liucansecwest2017&quot;&gt;Pwning the NExus of Every Pixel&lt;/a&gt; (slides CanSecWest 2017)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://pentestlab.blog/2017/03/13/injecting-metasploit-payloads-into-android-applications/&quot;&gt;Injecting Metasploit Payloads into Android Applications&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://receivefreesms.com/&quot;&gt;Receive FREE SMS online&lt;/a&gt; (number in various countries)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://microsoftrnd.co.il/Press%20Kit/BlueHat%20IL%20Decks/GalBeniamini.pdf&quot;&gt;TrustZone An Attackers Perspective&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://blog.quarkslab.com/reverse-engineering-samsung-s6-sboot-part-i.html&quot;&gt;Reverse Engineering Samsung S6 SBOOT - Part I&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.wyden.senate.gov/download/?id=966D3BC6-A1FE-4BF5-8B6E-D0B391DB34C1&amp;download=1&quot;&gt;Letter to the FCC on SS7 Security by Ron Wyden&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.fcc.gov/file/12153/download&quot;&gt;FCC: Legacy Systems Risk Reductions&lt;/a&gt; (it's about ss7)&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update March 2017</title>
 <pubDate>Tue, 07 Mar 2017 19:59:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2017/03/07#mobile_security_news_update_march2017</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://www.blackhat.com/asia-17/briefings/schedule/index.html&quot;&gt;Black Hat ASIA&lt;/a&gt; Singapore March 28-31.
FRIED APPLES: JAILBREAK DIY by Alex Hude, Max Bazaliy, Vlad Putin.
ANTI-PLUGIN: DON'T LET YOUR APP PLAY AS AN ANDROID PLUGIN by Cong Zheng, Tongbo Luo, Xin Ouyang, Zhi Xu.
REMOTELY COMPROMISING IOS VIA WI-FI AND ESCAPING THE SANDBOX by Marco Grassi.
3G/4G INTRANET SCANNING AND ITS APPLICATION ON THE WORMHOLE VULNERABILITY by Guangdong Bai, Zhang Qing.
MOBILE-TELEPHONY THREATS IN ASIA by Lion Gu, Marco Balduzzi, Payas Gupta.
MASHABLE: MOBILE APPLICATIONS OF SECRET HANDSHAKES OVER BLUETOOTH LE by Yan Michalevsky.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://cansecwest.com/&quot;&gt;CanSecWest&lt;/a&gt; Vancouver Canada, March 15-17.
Qidan He : Pwning Nexus of Every Pixel: Chain of Bugs demystified. 
Logic Bug Hunting in Chrome on Android by Georgi Hershey &amp; Robert Miller.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://zer0con.org/#speaker-section&quot;&gt;Zer0Con&lt;/a&gt; Seoul, Korea April 13-14.
Ian Beer : Through the mach portal. &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://osmocom.org/projects/osmo-dev-con/wiki/OsmoCon2017&quot;&gt;OsmoCon (Osmocom Conference) 2017 is the first technical conference for Osmocom users, operators and developers!&lt;/a&gt; April 21, Berlin. All about Osmocom!&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;http://conference.hitb.org/hitbsecconf2017ams/agenda/&quot;&gt;HITB Amsterdam&lt;/a&gt; April 13-14. 
FEMTOCELL HACKING: FROM ZERO TO ZERO DAY by JeongHoon Shin.
CAN'T TOUCH THIS: CLONING ANY ANDROID HCE CONTACTLESS CARD by Slawomir Jasek.
EXTRACTING ALL YOUR SECRETS: VULNERABILITIES IN ANDROID PASSWORD MANAGERS by Stephan Huber, Steven Artz, Siegfried Rasthofer.
HUNTING FOR VULNERABILITIES IN SIGNAL by Markus Vervier.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.opcde.com/speakers.html&quot;&gt;Opcde&lt;/a&gt; Dubai, UAE April 26-27.
Practical attacks against Digital Wallet by Loic Falletta.&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;
I took a way too long break again. So many things happen in the world of mobile security every &lt;i&gt;week&lt;/i&gt;. I really wish I had more time for this.
I also have a bunch of small things I need to put on this blog but I think they are too specific for the news and will likely get their own posts.
&lt;br&gt;&lt;Br&gt;

Some news from MWC (I didn't attend):
&lt;ul&gt;
First the BlackBerry &lt;a href=&quot;https://www.blackberrymobile.us/index&quot;&gt;KEYone&lt;/a&gt; a new
Android-based phone with a physical keyboard. Other then the BB Priv the KEYone's keyboard is fix and doesn't slide. Movable parts
are really not a good idea, they break way too fast. In my opinion this device looks super solid and likely will be supported longer
than the average flagship phone from other manufacturers (data on this would be awesome).
&lt;br&gt;&lt;br&gt;

Nokia released 3 new Android phones the 3 (MTK), 5 (QCOM) and &lt;a href=&quot;https://www.nokia.com/en_int/phones/nokia-6&quot;&gt;6&lt;/a&gt; (QCOM). The phones seem to run Android N without
any modifications or vendor crap. Very low price (230Euro for the 6). The bottom of their website specifically says: &lt;i&gt;You get an experience that's focused and clutter-free, and we'll make sure you keep getting regular updates, so you'll always stay on top of features and security.&lt;/i&gt;
that is what you should expect in 2017.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;

The &lt;a href=&quot;https://kb.androidtamer.com/Device_Security_Patch_tracker/&quot;&gt;Android Devices Security Patch Status&lt;/a&gt; page is an awesome
resource to determine if a specific device from a specific vendor has been patched and when the patch was released. From the page: &lt;i&gt;This list is Prepared to Serve as a Quick reference to identify which Device is being actively maintained by the Vendor.&lt;/i&gt;. This is super useful, thanks!&lt;br&gt;&lt;br&gt;

&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Xiaomi launching own SoC for Android phones-upgradable baseband with fake base station detection capabilities. IMSI catchers r threat now ;) &lt;a href=&quot;https://t.co/S0hzDBIiQd&quot;&gt;pic.twitter.com/S0hzDBIiQd&lt;/a&gt;&lt;/p&gt;&amp;mdash; Ravishankar Borgaonk (@raviborgaonkar) &lt;a href=&quot;https://twitter.com/raviborgaonkar/status/837313659273519104&quot;&gt;March 2, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;br&gt;

&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Apple 0day is expensive. &lt;a href=&quot;https://t.co/F1UEUU0s3r&quot;&gt;https://t.co/F1UEUU0s3r&lt;/a&gt;&lt;/p&gt;&amp;mdash; Collin Mulliner (@collinrm) &lt;a href=&quot;https://twitter.com/collinrm/status/834516199648157696&quot;&gt;February 22, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;Br&gt;

&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Ode to a dead 0-day - &lt;a href=&quot;https://twitter.com/hashtag/Android?src=hash&quot;&gt;#Android&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/DirtyCOW?src=hash&quot;&gt;#DirtyCOW&lt;/a&gt; explicated in iambic meter (from an &lt;a href=&quot;https://twitter.com/hashtag/Andevcon?src=hash&quot;&gt;#Andevcon&lt;/a&gt; 5-min flash talk back in Dec 16 :-) &lt;a href=&quot;https://t.co/IQ1RKmuW4f&quot;&gt;pic.twitter.com/IQ1RKmuW4f&lt;/a&gt;&lt;/p&gt;&amp;mdash; Jonathan Levin (@Morpheus______) &lt;a href=&quot;https://twitter.com/Morpheus______/status/838225982800678912&quot;&gt;March 5, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;

&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://en.mosec.org/&quot;&gt;MOSEC mobile security conference&lt;/a&gt; in June in Shanghai. This seems to be the 3rd year of the conference.
There is no schedule yet.
&lt;br&gt;&lt;br&gt;

The story of the day &lt;a href=&quot;https://wikileaks.org/ciav7p1/index.html&quot;&gt;Vault 7: CIA Hacking Tools Revealed&lt;/a&gt;. &lt;A href=&quot;https://wikileaks.org/ciav7p1/cms/page_13205587.html&quot;&gt;Vault 7: CIA Hacking Tools Revealed : iOS Exploit list&lt;/a&gt;. Yes, the CIA
uses n-day exploits! The &lt;a href=&quot;https://wikileaks.org/ciav7p1/cms/page_11629096.html&quot;&gt;Android exploits&lt;/a&gt;.&lt;br&gt;&lt;br&gt;

They talk about Android, Defcon, and backdooring your repo? ;-)&lt;br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;in&quot; dir=&quot;ltr&quot;&gt;CIA Memes Pt 2 &lt;a href=&quot;https://twitter.com/hashtag/Vault7?src=hash&quot;&gt;#Vault7&lt;/a&gt; &lt;a href=&quot;https://t.co/5RH4EvNMXO&quot;&gt;pic.twitter.com/5RH4EvNMXO&lt;/a&gt;&lt;/p&gt;&amp;mdash; Brendan Dolan-Gavitt (@moyix) &lt;a href=&quot;https://twitter.com/moyix/status/839150383834476544&quot;&gt;March 7, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;&lt;br&gt;&lt;br&gt;

Pic of the month:&lt;br&gt;
&lt;img src=&quot;https://pbs.twimg.com/media/C4e9zYTUcAAj0Wp.jpg&quot; width=&quot;50%&quot;&gt;&lt;br&gt;

Links
&lt;ul&gt;
&lt;a href=&quot;https://www.enisa.europa.eu/publications/smartphone-secure-development-guidelines-2016/at_download/fullReport&quot;&gt;ENISA: Smartphone Secure Development Guidelines&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://source.android.com/security/bulletin/2017-03-01.html&quot;&gt;Android Security Bulletin - March 2017&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://source.android.com/security/bulletin/2017-02-01.html&quot;&gt;Android Security Bulletin - February 2017&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://wikileaks.org/ciav7p1/&quot;&gt;Vault 7: CIA Hacking Tools Revealed&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://umtrx.org/multi-bts-with-osmocom-and-a-single-umtrx/&quot;&gt;Multi-BTS with Osmocom and a single UmTRX&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ucsb-seclab/agrigento&quot;&gt;Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis
&lt;/a&gt; Paper and Tool&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://source.android.com/source/running.html&quot;&gt;Booting into fastboot mode&lt;/a&gt; Instructions for all Nexus devices&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://insinuator.net/2017/03/troopers17-gsm-network-how-about-your-own-smpp-service/&quot;&gt;TROOPERS17 GSM Network -  How about your own SMPP Service?&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://arxiv.org/abs/1612.04433&quot;&gt;MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models &lt;/a&gt; paper&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://hexdetective.blogspot.com/2017/02/exploiting-android-s-boot-getting.html&quot;&gt;Exploiting Android S-Boot: Getting Arbitrary Code Exec in the Samsung Bootloader (1/2)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.symantec.com/connect/blogs/android-ransomware-requires-victim-speak-unlock-code&quot;&gt;Android ransomware requires victim to speak unlock code&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://hackernoon.com/hacking-android-phone-how-deep-the-rabbit-hole-goes-18b62ad65727#.do6kbu66h&quot;&gt;Hacking Android phone. How deep the rabbit hole goes.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.welivesecurity.com/2017/02/22/sunny-chance-stolen-credentials-malicious-weather-app-found-google-play/&quot;&gt;Sunny with a chance of stolen credentials: Malicious weather app found on Google Play&lt;/a&gt; 5k installs via Google Play!&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://forums.developer.apple.com/message/210531#210531&quot;&gt;iOS keychain items used to persist after app uninstall. As of iOS 10.3 beta 2, deleting app deletes keychain items&lt;/a&gt; via @hubert3&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://theroot.ninja/download.html&quot;&gt;SunShine 3.4.27 is out - Bringing unlock support for Droid Turbo on 6.0.x&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://laforge.gnumonks.org/blog/20170216-cellular_rebroadcast_over_sat/&quot;&gt;Cellular re-broadcast over satellite&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://data.satirg.org/wp-content/uploads/2015/11/2011a-GSM-re-Broadcast.pdf&quot;&gt;Identifying Rebroadcast (GSM)&lt;/a&gt; also linked in post above&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ahoog42/ios-triage/&quot;&gt;ios-triage - Node.js cli for iOS incident response. Program will extract, process and report (including diffs) on iOS device and app telemetry.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.reuters.com/article/us-tech-remote-idUSKBN15O305&quot;&gt;Remote control: Companies blur lines over who owns devices&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://itunes.apple.com/fr/app/shodan.io-app/id1022442292?mt=8&quot;&gt;Shodan.io iOS App&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://sentinelone.com/blogs/analysis-ios-guiinject-adware-library/&quot;&gt;Analysis of iOS.GuiInject Adware Library&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.vantagepoint.sg/blog/85-patching-and-re-signing-ios-apps&quot;&gt;Patching and Re-Signing iOS Apps&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://googleprojectzero.blogspot.com/2017/02/lifting-hyper-visor-bypassing-samsungs.html&quot;&gt;Lifting the (Hyper) Visor: Bypassing Samsung's Real-Time Kernel Protection&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.symantec.com/connect/blogs/android-ransomware-repurposes-old-dropper-techniques&quot;&gt;Android ransomware repurposes old dropper techniques&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.timac.org/?p=1570&quot;&gt;Deobfuscating libMobileGestalt keys&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://bugs.chromium.org/p/project-zero/issues/detail?id=938&quot;&gt;Samsung: Stack buffer overflow in OTP TrustZone trustlet&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.theverge.com/2017/2/3/14496656/donald-trump-phone-twitter-hack-spyware-hot-mic&quot;&gt;How easy it would be to hack Trump's phone&lt;/a&gt; by my friend Zach aka @quine&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.redsn0w.us/2017/01/ios-102-yalu-jailbreak-now-supports-all.html&quot;&gt;iOS 10.2 Yalu Jailbreak Now Supports All 64-bit Devices except iPhone 7 and iPad Air 2&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/nelenkov/aboot-parser&quot;&gt;Android bootloader (aboot) parser&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://androidtamer.com/tracking-android-security-update-across-devices/&quot;&gt;Tracking Android Security Update across Devices&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://vuldb.com/?id.96096&quot;&gt;SAMSUNG KNOX 1.0 ECRYPTFS KEY GENERATOR WEAK ENCRYPTION&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.fortinet.com/2017/01/26/deep-analysis-of-android-rootnik-malware-using-advanced-anti-debug-and-anti-hook-part-ii-analysis-of-the-scope-of-java&quot;&gt;Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part II: Analysis of The Scope of Java&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://arstechnica.com/information-technology/2017/01/silent-circle-bricks-grey-market-blackphones-with-os-update/&quot;&gt;Black market Blackphones get sent a kill message that bricks them&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://bugs.chromium.org/p/project-zero/issues/detail?id=1004&quot;&gt;iOS/MacOS kernel memory corruption due to userspace pointer being used as a length	&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://blog.crysys.hu/2017/03/update-on-the-fancy-bear-android-malware-poprd30-apk/&quot;&gt;Update on the Fancy Bear Android malware (poprd30.apk)&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf&quot;&gt;An Analysis of the Privacy and Security Risks of
Android VPN Permission-enabled Apps&lt;/a&gt; (paper)&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://blog.checkpoint.com/2017/01/24/charger-malware/&quot;&gt;Charger Malware Calls and Raises the Risk on Google Play&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://android.fallible.co/&quot;&gt;Secrets leak in Android apps&lt;/a&gt; online service to test APKs&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://team-sik.org/trent_portfolio/password-manager-apps/&quot;&gt;26 security issues in major Android password manager apps&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://arxiv.org/pdf/1702.04434.pdf&quot;&gt;Easy 4G/LTE IMSI Catchers for Non-Programmers&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.skycure.com/blog/app-in-the-middle/&quot;&gt;App-in-the-Middle Attack Bypasses Android for Work Secure Framework&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://github.com/frida/frida-java/commit/5977cebdcabecdd9e3594d2941d0ad15c6aa18dd&quot;&gt;Android FRIDA: Add support for enumerateLoadedClasses() on ART
&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://bugs.chromium.org/p/project-zero/issues/detail?id=1001&quot;&gt;Android: Inter-process munmap in android.util.MemoryIntArray&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://securityresear.ch/2017/02/08/oneplus3-bootloader-vulns/&quot;&gt;Owning a Locked OnePlus 3/3T: Bootloader Vulnerabilities&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://firehash.grayhash.com/&quot;&gt;Binary based obfuscation in a way of CTF kids. We obfuscate your apps, support both iOS/Android.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.flanker017.me/theme-to-system-privilege-in-emui-en/&quot;&gt;Android (Huawei) privilege escalation in EMUI keyguard app via loading shellcode in theme pack&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://medium.com/@bfrancis/the-story-of-firefox-os-cb5bf796e8fb#.8acqoyt1v&quot;&gt;The Story of Firefox OS&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>ENISA Smartphone Development Guidelines</title>
 <pubDate>Sun, 19 Feb 2017 16:39:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2017/02/19#enisa_smartphone_development_guidelines</link>
 <description>
The European Union Agency for Network and Information Security (ENISA) asked Ioannis Stais, Vincenzo Iozzo, and myself to update their 
guidelines for secure smartphone app development. The result is not much of an update but an entire rewrite of the guidelines. 
It was a fun project to do and I think all parties involved in the project are proud of the final result.
&lt;br&gt;&lt;br&gt;
The &lt;a href=&quot;https://www.enisa.europa.eu/news/enisa-news/enisa-issues-smartphone-development-guidelines&quot;&gt;Smartphone Development Guidelines&lt;/a&gt; website provides a brief overview
of the effort. The actual document can be downloaded here &lt;a href=&quot;https://www.enisa.europa.eu/publications/smartphone-secure-development-guidelines-2016/at_download/fullReport&quot;&gt;Smartphone_development_Guidelines.pdf&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
I would like to thank everybody again who helped on the project the project coordinators at ENISA and everybody who reviewed the document and provided feedback!</description>
 </item>
  <item>
 <title>Mobile Security News Update January 2017</title>
 <pubDate>Tue, 24 Jan 2017 19:17:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2017/01/24#mobile_security_news_update_jan2017</link>
 <description>
Conferences
&lt;ul&gt;
&lt;A href=&quot;https://recon.cx/2017/brussels/schedule/&quot;&gt;Recon Brussels&lt;/a&gt; Brussels, 27-29 January. 
Analyzing iOS apps: road from AppStore to security analysis report by Lenar Safin, Yaroslav Alexandrov, Egor Fominykh, Alexander Chernov.
&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.31c0n.co.nz/&quot;&gt;31CON&lt;/a&gt; Auckland NZ, 23-24 February. 
RAVISHANKAR BORGAONKAR (UK): PRIVACY ISSUES IN 4G. PHILIPPE LANGLOIS (FRANCE): something about mobile networks.&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://usmile.at/symposium/program&quot;&gt;Android Security Symposium 2017&lt;/a&gt; Vienna Austria, March.
Many interesting talks.&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.troopers.de/troopers17/agenda/&quot;&gt;Troopers&lt;/a&gt; Heidelberg, Germany. March.
Hunting For Vulnerabilities in Signal by Jean-Philippe Aumasson, Markus Vervier.
Samsung Pay: Tokenized Numbers, Flaws and Issues by Salvador Mendoza.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.troopers.de/troopers17/telcosec-day/&quot;&gt;TelcoSecDay @ Troopers&lt;/a&gt; 
It's no use crying over spilled 2G,3G,4G - what we need to fix in 5G. Outlook on 5G security from 3GPP perspective. Automated large-scale detection of rogue base stations: A field report.
Exploring fraud in telephony networks, an illustration with Over-The-Top Bypass.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://infiltratecon.com/speakers.html&quot;&gt;Infiltrate&lt;/a&gt; Miami, FL. March.
Jean-Philippe Aumasson,  Markus Vervier: Hunting For Vulnerabilities in Signal.
Georgi Geshev, Robert Miller: Logic Bug Hunting in Chrome on Android.
Marco Grassi,  Liang Chen: Remotely Compromising a Modern iOS Device.
Vasilis Tsaousoglou, Patroklos Argyroudis: The Shadow over Android: Heap exploitation assistance for Android's libc allocator.
Ralf-Phillip Weinmann: Did I hear a shell popping in your baseband?.&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;

CFPs
&lt;ul&gt;
&lt;A href=&quot;https://www.syscan360.org/en/cfp/&quot;&gt;SyScan360&lt;/a&gt; Seattle WA, USA (new conference)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.ysts.org/blank-2&quot;&gt;You Shot The Sheriff&lt;/a&gt;Sao Paulo - Brazil&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;

I'm not a fan or a user of WhatsApp but this &lt;a href=&quot;https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages&quot;&gt;backdoor story&lt;/a&gt; is just bad and will drive users away from a secure messaging app (maybe even the biggest install based of all of them). Zeynep Tufekci wrote an  
&lt;A href=&quot;http://technosociology.org/?page_id=1687&quot;&gt;open letter to the Guardian&lt;/a&gt; to have them update the story. Moxie also wrote a &lt;a href=&quot;https://whispersystems.org/blog/there-is-no-whatsapp-backdoor/&quot;&gt;blog post&lt;/a&gt; about these claims. The Guardian should have asked people with the technical expertise for advice before publishing the story.&lt;br&gt;&lt;Br&gt;

&lt;a href=&quot;https://www.att.com/esupport/article.html#!/wireless/KM1084805&quot;&gt;AT&amp;T 2G network shutdown happened on Dec 31 2016&lt;/a&gt;&lt;br&gt;&lt;br&gt;

&lt;a href=&quot;http://androidxref.com/&quot;&gt;AndroidXRef&lt;/a&gt; is looking for sponsors!&lt;br&gt;&lt;Br&gt;

The mobile talks from 33c3 are all totally worth watching (no particular order):
&lt;ul&gt;
&lt;a href=&quot;https://media.ccc.de/v/33c3-8151-dissecting_modern_3g_4g_cellular_modems&quot;&gt;Dissecting modern (3G/4G) cellular modems&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://media.ccc.de/v/33c3-8027-intercoms_hacking&quot;&gt;Intercoms Hacking&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://media.ccc.de/v/33c3-7888-downgrading_ios_from_past_to_present&quot;&gt;Downgrading iOS: From past to present&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://media.ccc.de/v/33c3-7901-pegasus_internals&quot;&gt;Pegasus Internals&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://media.ccc.de/v/33c3-7966-geolocation_methods_in_mobile_networks&quot;&gt;Geolocation methods in mobile networks&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://media.ccc.de/v/33c3-7969-shut_up_and_take_my_money&quot;&gt;Shut Up and Take My Money! The Red Pill of N26 Security&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://media.ccc.de/v/33c3-8042-code_brown_in_the_air&quot;&gt;Code BROWN in the Air. A systemic update of sensitive information that you sniff from pagers&lt;/A&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;

Pics of the month:
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;So, um… I guess the person who wrote &lt;a href=&quot;https://twitter.com/Medium&quot;&gt;@Medium&lt;/a&gt;&amp;#39;s overly-florid app store release notes was part of the layoffs &lt;a href=&quot;https://t.co/YEbcuC5FVn&quot;&gt;pic.twitter.com/YEbcuC5FVn&lt;/a&gt;&lt;/p&gt;&amp;mdash; Rod Begbie (@RodBegbie) &lt;a href=&quot;https://twitter.com/RodBegbie/status/820084948132466688&quot;&gt;January 14, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;&lt;a href=&quot;https://twitter.com/PatrickMcCanna&quot;&gt;@PatrickMcCanna&lt;/a&gt; again &lt;a href=&quot;https://t.co/UG4Fh1fYHM&quot;&gt;pic.twitter.com/UG4Fh1fYHM&lt;/a&gt;&lt;/p&gt;&amp;mdash; Jon Sawyer (@jcase) &lt;a href=&quot;https://twitter.com/jcase/status/823739589995073536&quot;&gt;January 24, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Best question so far about my 1992 Nokia 101: &amp;quot;How can it be older than the web, if it has a separate button for the &lt;a href=&quot;https://twitter.com/hashtag/hashtag?src=hash&quot;&gt;#hashtag&lt;/a&gt;?&amp;quot; &lt;a href=&quot;https://t.co/Sa9drZwtPe&quot;&gt;pic.twitter.com/Sa9drZwtPe&lt;/a&gt;&lt;/p&gt;&amp;mdash; Mikko Hypponen ଙ (@mikko) &lt;a href=&quot;https://twitter.com/mikko/status/823589402576187395&quot;&gt;January 23, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;Br&gt;

Links
&lt;ul&gt;
&lt;a href=&quot;http://security.samsungmobile.com/smrupdate.html#SMR-JAN-2017&quot;&gt;Samsung Android Security Updates for January&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.qualcomm.com/news/onq/2017/01/17/secure-boot-and-image-authentication-mobile-tech&quot;&gt;Secure boot and image authentication in mobile tech&lt;/a&gt; (white paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/practical-android-debugging-via-kgdb/&quot;&gt;Practical Android Debugging Via KGDB&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://hackernoon.com/we-reverse-engineered-16k-apps-heres-what-we-found-51bdf3b456bb#.vqp2vekza&quot;&gt;We reverse engineered 16k apps, here's what we found&lt;/a&gt; (hardcoded secrets mostly) they also have an online tool&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://habrahabr.ru/post/320150/&quot;&gt;Very detailed description of hacking the Kyocera KC-S701(Russian)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://labs.mwrinfosecurity.com/advisories/lg-g3-arbitrary-file-retrieval-from-cloud-services/&quot;&gt;LG G3 Arbitrary File Retrieval from Cloud Services&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://securingtomorrow.mcafee.com/mcafee-labs/trojanized-photo-app-on-google-play-signs-up-users-for-premium-services/&quot;&gt;Trojanized Photo App on Google Play Signs Up Users for Premium Services&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.xda-developers.com/oneplus-33t-bootloader-vulnerability-allows-changing-of-selinux-to-permissive-mode-in-fastboot/&quot;&gt;OnePlus 3/3T Bootloader Vulnerability Allows Changing of SELinux to Permissive Mode in Fastboot&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.qualcomm.com/news/onq/2017/01/10/qualcomm-releases-whitepaper-detailing-pointer-authentication-armv83&quot;&gt;Qualcomm releases whitepaper detailing pointer authentication on ARMv8.3&lt;/a&gt; (whitepaper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.freebuf.com/articles/wireless/124147.html&quot;&gt;IoT mode fuzzing with OpenBTS &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.efox-shop.com/versandkostenfrei-aus-de-blackphone-2-bp2-3gb-ram-32gb-rom-qualcomm-snapdragon-615-17ghz-octa-core-g-306774&quot;&gt;buy a BlackPhone for 120 Euros&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/cryptax/confsec&quot;&gt;Security conferences in 2017&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://jaq.alibaba.com/community/art/show?articleid=693&quot;&gt;Summary of Critical and Exploitable iOS Vulnerabilities in 2016&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://securelist.com/blog/mobile/76969/switcher-android-joins-the-attack-the-router-club/&quot;&gt;Switcher: Android joins the attack-the-router club&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.ubergizmo.com/2016/12/cyanogen-services-shutting-down/&quot;&gt;Cyanogen's Services Will Be Shutting Down&lt;/a&gt; (the commercial part of CyanoGen mode)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.invincealabs.com/blog/2016/12/v3spa-announcement/&quot;&gt;V3SPA: An Open Source Tool for Visually Analyzing and Diffing SELinux/SE for Android Security Policies&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://bugs.chromium.org/p/project-zero/issues/detail?id=965#c2&quot;&gt;Project Zero exploit for iOS 10.1.1&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide#tab=News&quot;&gt;OWASP Mobile Security Testing Guide&lt;/a&gt; (Work in Progress)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.bleepingcomputer.com/news/security/android-banking-trojan-source-code-leaked-online-leads-to-new-variation-right-away/&quot;&gt;Android Banking Trojan Source Code Leaked Online, Leads to New Variation Right Away&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.flanker017.me/theme-to-system-privilege-in-emui-en/&quot;&gt;A theme pack got you pwned with system privilege on Huawei's EMUI&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.techtimes.com/articles/194093/20170124/google-rolls-out-instant-apps-feature-for-android-download-and-run-apps-without-installing-them.htm&quot;&gt;Google Rolls Out Instant Apps Feature For Android: Download And Run Apps Without Installing Them&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/srsLTE/srsLTE&quot;&gt;Open source 3GPP LTE library&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://securityresear.ch/2017/01/04/fastboot-oem-sha1sum/&quot;&gt;fastboot oem sha1sum&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://2016.zeronights.ru/wp-content/uploads/2016/12/ZeroNights-2016_Sosonkin.pdf&quot;&gt;Automating iOS blackbox security scanning&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.cybermerchantsofdeath.com/blog/2017/01/20/meitu.html&quot;&gt;Meitu Android App TearDown&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.vantagepoint.sg/blog/82-hooking-android-system-calls-for-pleasure-and-benefit&quot;&gt;Hooking Android System Calls for Pleasure and Benefit&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/horrorho/InflatableDonkey&quot;&gt;iOS9 iCloud backup retrieval proof of concept&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/CunningLogic/PixelDump_CVE-2016-8462&quot;&gt;Pixel bootlaoder exploit for reading flash storage&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://securityintelligence.com/android-vulnerabilities-attacking-nexus-6-and-6p-custom-boot-modes/&quot;&gt;Android Vulnerabilities: Attacking Nexus 6 and 6P Custom Boot Modes&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.contextis.com/resources/blog/wap-just-happened-my-samsung-galaxy/&quot;&gt;Wap Push bugs in Samsung Android phones&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://arstechnica.com/security/2017/01/virulent-android-malware-returns-gets-2-million-downloads-on-google-play/&quot;&gt;Virulent Android malware returns, gets &gt;2 million downloads on Google Play&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.mawalabs.de/security/2017/01/18/hijack-whatsapp-accounts-using-whatsapp-web/&quot;&gt;HIJACKING WHATSAPP ACCOUNTS USING WHATSAPP WEB&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.susanka.eu/files/master-thesis-final.pdf&quot;&gt;Security Analysis of the Telegram IM&lt;/a&gt; (a Master's Thesis)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://source.android.com/security/bulletin/2017-01-01.html&quot;&gt;Android Security Bulletin - January 2017&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://arxiv.org/pdf/1701.00220v1.pdf&quot;&gt;Classification of Smartphone Users Using Internet Traffic&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.androidpolice.com/2016/12/30/lg-posts-january-security-bulletin-ahead-google-android-lg-specific-patches/&quot;&gt;LG posts January security bulletin ahead of Google with Android and LG-specific patches&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.zimperium.com/analysis-of-multiple-vulnerabilities-in-airdroid/&quot;&gt;Analysis of multiple vulnerabilities in AirDroid&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.helpnetsecurity.com/2016/10/17/android-banking-trojan-asks-victims-send-selfies-id-cards/&quot;&gt;Android banking Trojan asks victims to send selfies with ID cards&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.checkpoint.com/2017/01/23/hummingbad-returns/&quot;&gt;A Whale of a Tale: HummingBad Returns&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/Comsecuris/ios_dropbear&quot;&gt;iOS Dropbear SSH&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update December 2016</title>
 <pubDate>Tue, 13 Dec 2016 03:48:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2016/12/13#mobile_security_news_update_dec2016</link>
 <description>
Conferences
&lt;ul&gt;
&lt;A href=&quot;http://events.ccc.de&quot;&gt;33c3&lt;/a&gt; Hamburg, Germany 27-30 December.
Downgrading iOS: From past to present by tihmstar. A look into the Mobile Messaging Black Box by Roland Schilling and Frieder Steinmetz. Dissecting modern (3G/4G) cellular modems by
LaForge and holger. Geoloation methods in mobile networks by Erik.
&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://www.shmoocon.org&quot;&gt;Shmoocon&lt;/a&gt; Washington D.C. January.
A Context-Aware Kernel IPC Firewall for Android - David Wu, Sergey Bratus.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/asia-17/briefings/schedule/index.html&quot;&gt;Black Hat ASIA&lt;/a&gt; March 2017. FRIED APPLES: JAILBREAK DIY by Alex Hude and Max Bazaliy.
MASHABLE: MOBILE APPLICATIONS OF SECRET HANDSHAKES OVER BLUETOOTH LE by Yan Michalevsky.
REMOTELY COMPROMISING IOS VIA WI-FI AND ESCAPING THE SANDBOX by Marco Grassi.
&lt;/ul&gt;
&lt;br&gt;

I had to skip the November update due to a long overdue vacation. Playing with iOS webviews also did cost some time.
Writing this blog becomes more and more time consuming since for some parts I would rather spent time on
research than writing about other peoples research. Will see next year if I continue doing this or not. I'm doing 
this since &lt;a href=&quot;https://www.mulliner.org/blog/blosxom.cgi/security/mobile_security_updates_Jan09.html&quot;&gt;January 2009&lt;/a&gt; so it has been a few years.
&lt;br&gt;&lt;br&gt;

New Conference:
&lt;ul&gt;
&lt;a href=&quot;http://www.opcde.com&quot;&gt;Opcde&lt;/a&gt; Conference&lt;br&gt;&lt;Br&gt;
&lt;/ul&gt;

&lt;A href=&quot;http://www.theverge.com/circuitbreaker/2016/12/9/13897794/samsung-galaxy-note-7-update-shut-down-inoperable&quot;&gt;Samsung confirms it will render the US Note 7 useless with next update&lt;/a&gt; since the owners don't seem to care to return the phones
to Samsung even tho they would get a replacement device. This is kind of hilarious. &lt;br&gt;&lt;Br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;The scariest costume of all this Halloween is the Galaxy Note 7 recall &lt;a href=&quot;https://t.co/g29SfWG9bO&quot;&gt;https://t.co/g29SfWG9bO&lt;/a&gt; &lt;a href=&quot;https://t.co/Zc9Fe6s42X&quot;&gt;pic.twitter.com/Zc9Fe6s42X&lt;/a&gt;&lt;/p&gt;&amp;mdash; The Verge (@verge) &lt;a href=&quot;https://twitter.com/verge/status/788663979640061953&quot;&gt;October 19, 2016&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;Br&gt;

Browser based &lt;A href=&quot;https://jbme.qwertyoruiop.com/&quot;&gt;iOS 9.3.x jailbreak (64bit only) it has been a while.&lt;br&gt;&lt;br&gt;

&lt;a href=&quot;http://arstechnica.com/security/2016/11/chinese-company-installed-secret-backdoor-on-hundreds-of-thousands-of-phones/&quot;&gt;Chinese company installed secret backdoor on hundreds of thousands of phones&lt;/a&gt;&lt;br&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Here is the BLU R1 blind system command execution via Adups from July of this year - anyone think they care? &lt;a href=&quot;https://t.co/veUMGD8zSy&quot;&gt;pic.twitter.com/veUMGD8zSy&lt;/a&gt;&lt;/p&gt;&amp;mdash; Tim Strazzere (@timstrazz) &lt;a href=&quot;https://twitter.com/timstrazz/status/801193439639535616&quot;&gt;November 22, 2016&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;br&gt;&lt;Br&gt;
Recently the topic of SMS 2FA came up again. While I agree that SMS is not the most secure version of 2FA it is far far better
then not providing any 2FA mechanism for your service.&lt;br&gt; 
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Seems like the right ordering, but when deployment is 98% &amp;lt; 2% &amp;lt; .5% &amp;lt; .01% complaining about SMS security is pretty silly. &lt;a href=&quot;https://t.co/5ex3naa5a5&quot;&gt;https://t.co/5ex3naa5a5&lt;/a&gt;&lt;/p&gt;&amp;mdash; Alex Stamos (@alexstamos) &lt;a href=&quot;https://twitter.com/alexstamos/status/804367695860744192&quot;&gt;December 1, 2016&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;


&lt;br&gt;&lt;br&gt;
Links
&lt;ul&gt;
&lt;a href=&quot;https://twitter.com/oxygenforensic/status/804692950861094912&quot;&gt;Oxygen 9.0.3 allows to brute force a passcode for any Windows Phone 8 device from its physical dump!&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://packetstormsecurity.com/files/139998&quot;&gt;Android system_server Code Loading Bypass&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://gist.github.com/Arinerron/0e99d69d70a778ca13a0087fa6fdfd80&quot;&gt;&quot;Root&quot; via dirtyc0w privilege escalation exploit (automation script) / Android (32 bit) Raw&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://arxiv.org/pdf/1510.07563.pdf&quot;&gt;Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://sysforensics.org/2016/08/jtaging-mobile-phones/&quot;&gt;JTAGing Mobile Phones&lt;/a&gt; (from August)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://blog.cryptographyengineering.com/2016/11/24/android-n-encryption/&quot;&gt;The limitations of Android N Encryption&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://plus.google.com/+AdrianLudwig/posts/GXzJ8vaAFsi&quot;&gt;The fight against Ghost Push continues&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://googleprojectzero.blogspot.com/2016/12/bitunmap-attacking-android-ashmem.html&quot;&gt;BitUnmap: Attacking Android Ashmem&lt;/A&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://android-developers.blogspot.com/2016/12/saving-data-reducing-the-size-of-app-updates-by-65-percent.html&quot;&gt;Saving Data: Reducing the size of App Updates by 65%&lt;/a&gt; (looks interesting)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;//blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/&quot;&gt;More Than 1 Million Google Accounts Breached by Gooligan&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.telegeography.com/products/commsupdate/articles/2016/12/02/telstra-switches-off-gsm-network/&quot;&gt;Telstra is switching off their GSM network&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://hackerone.com/qualcomm&quot;&gt;Qualcomm has a Bug Bounty now&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://hackerone.com/nintendo&quot;&gt;Nintendo has a Bug Bounty now&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://ramtin-amin.fr/#nvmedma&quot;&gt;Secure Rom extraction on iPhone 6s&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://source.android.com/security/bulletin/2016-12-01.html&quot;&gt;Android Security Bulletin - December 2016&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://rednaga.io/2016/11/14/hackingteam_back_for_your_androids/&quot;&gt;HackingTeam back for your Androids, now extra insecure!
&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://t.co/l7ENUInbZo&quot;&gt;SunShine 3.4.18 has been released. Bring Support for Android 7.x.x and latest HTC 10 updates&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.royalholloway.ac.uk/isg/documents/pdf/technicalreports/2016/rhul-isg-2016-8-oliver-kunz.pdf&quot;&gt;A detailed security assessment on Android Full Disk Encryption&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://googleprojectzero.blogspot.com/2016/12/bitunmap-attacking-android-ashmem.html&quot;&gt;BitUnmap: Attacking Android Ashmem&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://hitcon.org/2016/CMT/slide/day2-r2-c-1.pdf&quot;&gt;Fuzzing Android OMX&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://smsprivacy.org/&quot;&gt;Anonymous web-based SMS&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://www.itu.int/pub/T-SP-E.212B-2016&quot;&gt;Mobile Network Codes (MNC) for the international identification plan for public networks and subscriptions (According to Recommendation ITU-T E.212 (09/2016))&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.nowsecure.com/blog/2016/11/22/exploit-ios-webviews-force-automatic-facetime-call/&quot;&gt;Call me maybe: Exploiting iOS WebViews to force automatic FaceTime calls&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://blog.fortinet.com/2016/11/18/android-banking-malware-masquerading-as-email-app-targets-german-banks&quot;&gt;Android Banking Malware Masquerading as Email App Targets German Banks
&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.bleepingcomputer.com/news/security/second-chinese-firm-in-a-week-found-hiding-backdoor-in-firmware-of-android-devices/&quot;&gt;Second Chinese Firm in a Week Found Hiding Backdoor in Firmware of Android Devices&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://arstechnica.com/security/2016/11/powerful-backdoorrootkit-found-preinstalled-on-3-million-android-phones/&quot;&gt;Powerful backdoor/rootkit found preinstalled on 3 million Android phones&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://blog.anubisnetworks.com/blog/ragentek-android-ota-update-mechanism-vulnerable-to-mitm-attack&quot;&gt;RAGENTEK ANDROID OTA UPDATE MECHANISM VULNERABLE TO MITM ATTACK&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://powerofcommunity.net/poc2016/x82.pdf&quot;&gt;New Reliable Android Kernel Root
Exploitation Techniques&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://sentinelone.com/blogs/analysis-ios-guiinject-adware-library/&quot;&gt;Analysis of iOS.GuiInject Adware Library&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://source.android.com/security/bulletin/2016-11-01.html&quot;&gt;Android Security Bulletin - November 2016&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://github.com/necst/heldroid&quot;&gt;HelDroid: Dissect Android Apps Looking for Ransomware Functionalities&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://speakerdeck.com/retme7/rooting-every-android-from-extension-to-exploitation&quot;&gt;Rooting Every Android From Extension To Exploitation by Di Shen&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.blackhat.com/docs/eu-16/materials/eu-16-Bazaliy-Mobile-Espionage-in-the-Wild-Pegasus-and-Nation-State-Level-Attacks.pdf&quot;&gt;Mobile Espionage in the Wild Pegasus and Nation-State Level Attacks &lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.android.com/security-center/&quot;&gt;The Android Security Center&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://info.lookout.com/rs/051-ESQ-475/images/pegasus-exploits-technical-details.pdf&quot;&gt;Technical Analysis of the Pegasus Exploits on iOS&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://github.com/MrVaughan/Defcon2016GSMData&quot;&gt;Just a place to dump the cdma data I collected while at Defcon 2016&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://dl.acm.org/citation.cfm?id=2994473&quot;&gt;CRiOS: Toward Large-Scale iOS Application Analysis&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://www.slideshare.net/EC-Council/exploring-lte-security-and-protocol-exploits-with-open-source-software-and-lowcost-software-radio-by-roger-jover&quot;&gt;Exploring LTE security and protocol exploits with open source software and low-cost software radio by Roger Jover&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.ted.com/talks/christopher_soghoian_your_smartphone_is_a_civil_rights_issue&quot;&gt;Your smartphone is a civil rights issue&lt;/a&gt; (TED talk)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://receive-sms.com/?tag=Google%20verification&quot;&gt;Receive SMS Online&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://t.co/vP3vaS0gTg&quot;&gt;Drammer APK&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://carvesystems.com/blog/wear-mitm.html&quot;&gt;Android wear MiTM&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://dl.acm.org/citation.cfm?id=2996358&quot;&gt;*droid: Assessment and Evaluation of Android Application Analysis Tools&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.mulliner.org/blog/blosxom.cgi/mobile/google_fi_iphone.html&quot;&gt;Using Google Fi on an iPhone &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.mulliner.org/blog/blosxom.cgi/security/ios_webview_auto_dialer.html&quot;&gt;iOS WebView auto dialer bug&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Kiwicon X</title>
 <pubDate>Sat, 10 Dec 2016 23:35:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2016/12/10#kiwicon2016</link>
 <description>
I finally made it to &lt;a href=&quot;https://kiwicon.org/&quot;&gt;Kiwicon&lt;/a&gt; this year (special thanks to &lt;i&gt;vt&lt;/i&gt; for dragging us out!). I even managed to
get a talk in (con bucket list--) making the trip even sweeter. &lt;br&gt;&lt;br&gt;
The conference was absolutely awesome. Well organized, friendly people (staff and attendees!),
and a perfect venue. The conference had about 2500 attendees which seemed like a good fit for the venue.
I liked the overall program, the intermissions and speaker introductions were absolutely fantastic.
In my opinion Kiwicon is at the sweet spot on the issues of size and target audience. It is big enough to
be attract different kinds of folks and it is small enough to find people and hangout. I also really love single
track conferences!&lt;br&gt;&lt;br&gt;

Sadly it was announced that this was the last Kiwicon, I'm happy to have made it to the last one! 
&lt;b&gt;Thanks!&lt;/b&gt;
&lt;br&gt;&lt;br&gt;

Below a few photos and videos from Kiwicon, the  
&lt;a href=&quot;https://www.flickr.com/photos/4nitsirk/sets/72157675196306472&quot;&gt;official Kiwicon photos are here&lt;/a&gt;.
&lt;br&gt;
&lt;br&gt;
&lt;blockquote class=&quot;instagram-media&quot; data-instgrm-captioned data-instgrm-version=&quot;7&quot; style=&quot; background:#FFF; border:0; border-radius:3px; box-shadow:0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width:658px; padding:0; width:99.375%; width:-webkit-calc(100% - 2px); width:calc(100% - 2px);&quot;&gt;&lt;div style=&quot;padding:8px;&quot;&gt; &lt;div style=&quot; background:#F8F8F8; line-height:0; margin-top:40px; padding:50.0% 0; text-align:center; width:100%;&quot;&gt; &lt;div style=&quot; background:url(data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACwAAAAsCAMAAAApWqozAAAABGdBTUEAALGPC/xhBQAAAAFzUkdCAK7OHOkAAAAMUExURczMzPf399fX1+bm5mzY9AMAAADiSURBVDjLvZXbEsMgCES5/P8/t9FuRVCRmU73JWlzosgSIIZURCjo/ad+EQJJB4Hv8BFt+IDpQoCx1wjOSBFhh2XssxEIYn3ulI/6MNReE07UIWJEv8UEOWDS88LY97kqyTliJKKtuYBbruAyVh5wOHiXmpi5we58Ek028czwyuQdLKPG1Bkb4NnM+VeAnfHqn1k4+GPT6uGQcvu2h2OVuIf/gWUFyy8OWEpdyZSa3aVCqpVoVvzZZ2VTnn2wU8qzVjDDetO90GSy9mVLqtgYSy231MxrY6I2gGqjrTY0L8fxCxfCBbhWrsYYAAAAAElFTkSuQmCC); display:block; height:44px; margin:0 auto -44px; position:relative; top:-22px; width:44px;&quot;&gt;&lt;/div&gt;&lt;/div&gt; &lt;p style=&quot; margin:8px 0 0 0; padding:0 4px;&quot;&gt; &lt;a href=&quot;https://www.instagram.com/p/BN2uwcwDhAN/&quot; style=&quot; color:#000; font-family:Arial,sans-serif; font-size:14px; font-style:normal; font-weight:normal; line-height:17px; text-decoration:none; word-wrap:break-word;&quot; target=&quot;_blank&quot;&gt;KiwiCon intro #kiwicon #latergram&lt;/a&gt;&lt;/p&gt; &lt;p style=&quot; color:#c9c8cd; font-family:Arial,sans-serif; font-size:14px; line-height:17px; margin-bottom:0; margin-top:8px; overflow:hidden; padding:8px 0 7px; text-align:center; text-overflow:ellipsis; white-space:nowrap;&quot;&gt;A video posted by Collin (@collin_rm) on &lt;time style=&quot; font-family:Arial,sans-serif; font-size:14px; line-height:17px;&quot; datetime=&quot;2016-12-10T23:31:56+00:00&quot;&gt;Dec 10, 2016 at 3:31pm PST&lt;/time&gt;&lt;/p&gt;&lt;/div&gt;&lt;/blockquote&gt; &lt;script async defer src=&quot;//platform.instagram.com/en_US/embeds.js&quot;&gt;&lt;/script&gt;
&lt;blockquote class=&quot;instagram-media&quot; data-instgrm-captioned data-instgrm-version=&quot;7&quot; style=&quot; background:#FFF; border:0; border-radius:3px; box-shadow:0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width:658px; padding:0; width:99.375%; width:-webkit-calc(100% - 2px); width:calc(100% - 2px);&quot;&gt;&lt;div style=&quot;padding:8px;&quot;&gt; &lt;div style=&quot; background:#F8F8F8; line-height:0; margin-top:40px; padding:50.0% 0; text-align:center; width:100%;&quot;&gt; &lt;div style=&quot; background:url(data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACwAAAAsCAMAAAApWqozAAAABGdBTUEAALGPC/xhBQAAAAFzUkdCAK7OHOkAAAAMUExURczMzPf399fX1+bm5mzY9AMAAADiSURBVDjLvZXbEsMgCES5/P8/t9FuRVCRmU73JWlzosgSIIZURCjo/ad+EQJJB4Hv8BFt+IDpQoCx1wjOSBFhh2XssxEIYn3ulI/6MNReE07UIWJEv8UEOWDS88LY97kqyTliJKKtuYBbruAyVh5wOHiXmpi5we58Ek028czwyuQdLKPG1Bkb4NnM+VeAnfHqn1k4+GPT6uGQcvu2h2OVuIf/gWUFyy8OWEpdyZSa3aVCqpVoVvzZZ2VTnn2wU8qzVjDDetO90GSy9mVLqtgYSy231MxrY6I2gGqjrTY0L8fxCxfCBbhWrsYYAAAAAElFTkSuQmCC); display:block; height:44px; margin:0 auto -44px; position:relative; top:-22px; width:44px;&quot;&gt;&lt;/div&gt;&lt;/div&gt; &lt;p style=&quot; margin:8px 0 0 0; padding:0 4px;&quot;&gt; &lt;a href=&quot;https://www.instagram.com/p/BM4ivkWj16Y/&quot; style=&quot; color:#000; font-family:Arial,sans-serif; font-size:14px; font-style:normal; font-weight:normal; line-height:17px; text-decoration:none; word-wrap:break-word;&quot; target=&quot;_blank&quot;&gt;KiwiConX&lt;/a&gt;&lt;/p&gt; &lt;p style=&quot; color:#c9c8cd; font-family:Arial,sans-serif; font-size:14px; line-height:17px; margin-bottom:0; margin-top:8px; overflow:hidden; padding:8px 0 7px; text-align:center; text-overflow:ellipsis; white-space:nowrap;&quot;&gt;A video posted by Collin (@collin_rm) on &lt;time style=&quot; font-family:Arial,sans-serif; font-size:14px; line-height:17px;&quot; datetime=&quot;2016-11-16T19:54:02+00:00&quot;&gt;Nov 16, 2016 at 11:54am PST&lt;/time&gt;&lt;/p&gt;&lt;/div&gt;&lt;/blockquote&gt; &lt;script async defer src=&quot;//platform.instagram.com/en_US/embeds.js&quot;&gt;&lt;/script&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;At &lt;a href=&quot;https://twitter.com/hashtag/KiwiConX?src=hash&quot;&gt;#KiwiConX&lt;/a&gt; with &lt;a href=&quot;https://twitter.com/collinrm&quot;&gt;@collinrm&lt;/a&gt; &lt;a href=&quot;https://t.co/2ye9l7GMLw&quot;&gt;pic.twitter.com/2ye9l7GMLw&lt;/a&gt;&lt;/p&gt;&amp;mdash; Martin Herfurt (@mherfurt) &lt;a href=&quot;https://twitter.com/mherfurt/status/798985971345854469&quot;&gt;November 16, 2016&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;
&lt;blockquote class=&quot;instagram-media&quot; data-instgrm-captioned data-instgrm-version=&quot;7&quot; style=&quot; background:#FFF; border:0; border-radius:3px; box-shadow:0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width:658px; padding:0; width:99.375%; width:-webkit-calc(100% - 2px); width:calc(100% - 2px);&quot;&gt;&lt;div style=&quot;padding:8px;&quot;&gt; &lt;div style=&quot; background:#F8F8F8; line-height:0; margin-top:40px; padding:50.0% 0; text-align:center; width:100%;&quot;&gt; &lt;div style=&quot; background:url(data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACwAAAAsCAMAAAApWqozAAAABGdBTUEAALGPC/xhBQAAAAFzUkdCAK7OHOkAAAAMUExURczMzPf399fX1+bm5mzY9AMAAADiSURBVDjLvZXbEsMgCES5/P8/t9FuRVCRmU73JWlzosgSIIZURCjo/ad+EQJJB4Hv8BFt+IDpQoCx1wjOSBFhh2XssxEIYn3ulI/6MNReE07UIWJEv8UEOWDS88LY97kqyTliJKKtuYBbruAyVh5wOHiXmpi5we58Ek028czwyuQdLKPG1Bkb4NnM+VeAnfHqn1k4+GPT6uGQcvu2h2OVuIf/gWUFyy8OWEpdyZSa3aVCqpVoVvzZZ2VTnn2wU8qzVjDDetO90GSy9mVLqtgYSy231MxrY6I2gGqjrTY0L8fxCxfCBbhWrsYYAAAAAElFTkSuQmCC); display:block; height:44px; margin:0 auto -44px; position:relative; top:-22px; width:44px;&quot;&gt;&lt;/div&gt;&lt;/div&gt; &lt;p style=&quot; margin:8px 0 0 0; padding:0 4px;&quot;&gt; &lt;a href=&quot;https://www.instagram.com/p/BM5R4F3jeF9/&quot; style=&quot; color:#000; font-family:Arial,sans-serif; font-size:14px; font-style:normal; font-weight:normal; line-height:17px; text-decoration:none; word-wrap:break-word;&quot; target=&quot;_blank&quot;&gt;KiwiCon sheep&lt;/a&gt;&lt;/p&gt; &lt;p style=&quot; color:#c9c8cd; font-family:Arial,sans-serif; font-size:14px; line-height:17px; margin-bottom:0; margin-top:8px; overflow:hidden; padding:8px 0 7px; text-align:center; text-overflow:ellipsis; white-space:nowrap;&quot;&gt;A photo posted by Collin (@collin_rm) on &lt;time style=&quot; font-family:Arial,sans-serif; font-size:14px; line-height:17px;&quot; datetime=&quot;2016-11-17T02:45:53+00:00&quot;&gt;Nov 16, 2016 at 6:45pm PST&lt;/time&gt;&lt;/p&gt;&lt;/div&gt;&lt;/blockquote&gt; &lt;script async defer src=&quot;//platform.instagram.com/en_US/embeds.js&quot;&gt;&lt;/script&gt;



&lt;blockquote class=&quot;instagram-media&quot; data-instgrm-captioned data-instgrm-version=&quot;7&quot; style=&quot; background:#FFF; border:0; border-radius:3px; box-shadow:0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width:658px; padding:0; width:99.375%; width:-webkit-calc(100% - 2px); width:calc(100% - 2px);&quot;&gt;&lt;div style=&quot;padding:8px;&quot;&gt; &lt;div style=&quot; background:#F8F8F8; line-height:0; margin-top:40px; padding:50.0% 0; text-align:center; width:100%;&quot;&gt; &lt;div style=&quot; background:url(data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACwAAAAsCAMAAAApWqozAAAABGdBTUEAALGPC/xhBQAAAAFzUkdCAK7OHOkAAAAMUExURczMzPf399fX1+bm5mzY9AMAAADiSURBVDjLvZXbEsMgCES5/P8/t9FuRVCRmU73JWlzosgSIIZURCjo/ad+EQJJB4Hv8BFt+IDpQoCx1wjOSBFhh2XssxEIYn3ulI/6MNReE07UIWJEv8UEOWDS88LY97kqyTliJKKtuYBbruAyVh5wOHiXmpi5we58Ek028czwyuQdLKPG1Bkb4NnM+VeAnfHqn1k4+GPT6uGQcvu2h2OVuIf/gWUFyy8OWEpdyZSa3aVCqpVoVvzZZ2VTnn2wU8qzVjDDetO90GSy9mVLqtgYSy231MxrY6I2gGqjrTY0L8fxCxfCBbhWrsYYAAAAAElFTkSuQmCC); display:block; height:44px; margin:0 auto -44px; position:relative; top:-22px; width:44px;&quot;&gt;&lt;/div&gt;&lt;/div&gt; &lt;p style=&quot; margin:8px 0 0 0; padding:0 4px;&quot;&gt; &lt;a href=&quot;https://www.instagram.com/p/BM7faF0jsxh/&quot; style=&quot; color:#000; font-family:Arial,sans-serif; font-size:14px; font-style:normal; font-weight:normal; line-height:17px; text-decoration:none; word-wrap:break-word;&quot; target=&quot;_blank&quot;&gt;IR Fire detector #kiwicon&lt;/a&gt;&lt;/p&gt; &lt;p style=&quot; color:#c9c8cd; font-family:Arial,sans-serif; font-size:14px; line-height:17px; margin-bottom:0; margin-top:8px; overflow:hidden; padding:8px 0 7px; text-align:center; text-overflow:ellipsis; white-space:nowrap;&quot;&gt;A video posted by Collin (@collin_rm) on &lt;time style=&quot; font-family:Arial,sans-serif; font-size:14px; line-height:17px;&quot; datetime=&quot;2016-11-17T23:22:37+00:00&quot;&gt;Nov 17, 2016 at 3:22pm PST&lt;/time&gt;&lt;/p&gt;&lt;/div&gt;&lt;/blockquote&gt; &lt;script async defer src=&quot;//platform.instagram.com/en_US/embeds.js&quot;&gt;&lt;/script&gt;

&lt;blockquote class=&quot;instagram-media&quot; data-instgrm-captioned data-instgrm-version=&quot;7&quot; style=&quot; background:#FFF; border:0; border-radius:3px; box-shadow:0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width:658px; padding:0; width:99.375%; width:-webkit-calc(100% - 2px); width:calc(100% - 2px);&quot;&gt;&lt;div style=&quot;padding:8px;&quot;&gt; &lt;div style=&quot; background:#F8F8F8; line-height:0; margin-top:40px; padding:50.0% 0; text-align:center; width:100%;&quot;&gt; &lt;div style=&quot; background:url(data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACwAAAAsCAMAAAApWqozAAAABGdBTUEAALGPC/xhBQAAAAFzUkdCAK7OHOkAAAAMUExURczMzPf399fX1+bm5mzY9AMAAADiSURBVDjLvZXbEsMgCES5/P8/t9FuRVCRmU73JWlzosgSIIZURCjo/ad+EQJJB4Hv8BFt+IDpQoCx1wjOSBFhh2XssxEIYn3ulI/6MNReE07UIWJEv8UEOWDS88LY97kqyTliJKKtuYBbruAyVh5wOHiXmpi5we58Ek028czwyuQdLKPG1Bkb4NnM+VeAnfHqn1k4+GPT6uGQcvu2h2OVuIf/gWUFyy8OWEpdyZSa3aVCqpVoVvzZZ2VTnn2wU8qzVjDDetO90GSy9mVLqtgYSy231MxrY6I2gGqjrTY0L8fxCxfCBbhWrsYYAAAAAElFTkSuQmCC); display:block; height:44px; margin:0 auto -44px; position:relative; top:-22px; width:44px;&quot;&gt;&lt;/div&gt;&lt;/div&gt; &lt;p style=&quot; margin:8px 0 0 0; padding:0 4px;&quot;&gt; &lt;a href=&quot;https://www.instagram.com/p/BM46rxMjG-E/&quot; style=&quot; color:#000; font-family:Arial,sans-serif; font-size:14px; font-style:normal; font-weight:normal; line-height:17px; text-decoration:none; word-wrap:break-word;&quot; target=&quot;_blank&quot;&gt;KiwiCon beer&lt;/a&gt;&lt;/p&gt; &lt;p style=&quot; color:#c9c8cd; font-family:Arial,sans-serif; font-size:14px; line-height:17px; margin-bottom:0; margin-top:8px; overflow:hidden; padding:8px 0 7px; text-align:center; text-overflow:ellipsis; white-space:nowrap;&quot;&gt;A photo posted by Collin (@collin_rm) on &lt;time style=&quot; font-family:Arial,sans-serif; font-size:14px; line-height:17px;&quot; datetime=&quot;2016-11-16T23:23:14+00:00&quot;&gt;Nov 16, 2016 at 3:23pm PST&lt;/time&gt;&lt;/p&gt;&lt;/div&gt;&lt;/blockquote&gt; &lt;script async defer src=&quot;//platform.instagram.com/en_US/embeds.js&quot;&gt;&lt;/script&gt;

&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Subtle &lt;a href=&quot;https://twitter.com/kiwicon&quot;&gt;@kiwicon&lt;/a&gt; and I love you all for it &lt;a href=&quot;https://t.co/FBPZwQL4nU&quot;&gt;pic.twitter.com/FBPZwQL4nU&lt;/a&gt;&lt;/p&gt;&amp;mdash; /wade (@vashta_nerdrada) &lt;a href=&quot;https://twitter.com/vashta_nerdrada/status/800855044195229696&quot;&gt;November 22, 2016&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;

&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;&lt;p lang=&quot;fr&quot; dir=&quot;ltr&quot;&gt;Ohai KiwiCon &lt;a href=&quot;https://t.co/lZT7ldKw18&quot;&gt;pic.twitter.com/lZT7ldKw18&lt;/a&gt;&lt;/p&gt;&amp;mdash; Collin Mulliner (@collinrm) &lt;a href=&quot;https://twitter.com/collinrm/status/798970481416273922&quot;&gt;November 16, 2016&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async src=&quot;//platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;</description>
 </item>
  <item>
 <title>iOS WebView auto dialer bug</title>
 <pubDate>Tue, 08 Nov 2016 01:26:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2016/11/08#ios_webview_auto_dialer</link>
 <description>
TL;DR: iOS WebViews can be used to automatically call an attacker controlled phone number. The attack can block the phone's UI
for a short amount of time and therefore prevent the victim from canceling the call. The bug is an application bug that
likely is due to bad OS/framework defaults. One major issue with this vulnerability is that it is really easy to exploit.
App developers have to fix their code as soon as possible.
The Twitter and LinkedIn iOS apps are vulnerable (other apps might be vulnerable too). 
Demo videos here: &lt;a href=&quot;https://youtu.be/oYDfe_P9uAQ&quot;&gt;Twitter&lt;/a&gt; and &lt;a href=&quot;https://youtu.be/WuFx4lxF8DY&quot;&gt;LinkedIn&lt;/a&gt; 
(embedded videos are below on this page).&lt;br&gt;&lt;Br&gt;

About a week ago (on a Friday) I read an news post [1,2] about a guy who got arrested for &lt;i&gt;accidentally&lt;/i&gt; DoSing 911 by
creating a web page that automatically dialed 911 when visited it from an iPhone. 
This was most likely due to a bug with the handling of TEL URI [4,5]. I immediately thought about 
&lt;a href=&quot;https://archive.cert.uni-stuttgart.de/bugtraq/2009/06/msg00190.html&quot;&gt;a bug I reported to Apple in late October 2008&lt;/a&gt; [3].
I couldn't believe this bug has resurfaced so I investigated. The article said something about posting links on Twitter.
&lt;br&gt;
&lt;ul&gt;
If you think automatically dialing a phone number after clicking a link in an app is not a big issue think again. DoSing
911 is pretty terrible but there are other examples such as expensive 900 numbers where the attacker can actually make money.
A stalker can make his victim dial his phone number so he gets his victim's number. Altogether things you don't want to happen.
&lt;/ul&gt;
Anyway ... I went and looked at the iOS Twitter app. I got a very simple auto phone dialer working in a very short time. 
I was happy and also devastated that it was that easy. 
I first thought I reproduced the exact bug but later after re-reading the 
articles [1,2] more carefully I determined that it is likely a different bug or at least a different trigger. The article 
reported heavy use of JavaScript and pop-ups being shown and such. 
My &lt;b&gt;original&lt;/b&gt; trigger was one line of HTML (a meta-refresh tag that points to a TEL URL) 
due to this I decided to report the bug to Twitter via their Bug Bounty program on HackerOne.
I never reported to a bug bounty program before so I was happy to gain some experience (I normally report via security@), 
but it is 2016 and companies pay for bugs so here we go. Twitter acknowledged that it looks like a problem within a few days.
&lt;ul&gt;
On Nov. 6th I updated the bug report to Twitter to add the UI blocking issue (continue reading) and uploaded a video. Today Twitter
simply closes the bug as a duplicate without any comment. While this might be a simple duplicate they should have an interest in
playing nice and being thankful to those who report bugs they find in their spare time. 
Because of this action I decided to post the full details of the issue today.
&lt;/ul&gt;
&lt;br&gt;
During the weekend I took some time to further investigate the issue. I determined that this might be a general issue with
iOS apps the use WebViews to display content. I tested a few popular apps I had installed. 
Vulnerable apps need a way for users to post web links that will be opened in a WebView inside the app itself. 
Apps that open links in mobile Safari or Chrome would not be vulnerable (I tested this). 
One app I tested fairly early was the LinkedIn app since LinkedIn basically is
social media for the business context. People can send messages and post updates. Updates usually are text and link. I posted
a link and clicked it and yes it dialed my other phone (demo video below).
&lt;br&gt;&lt;Br&gt;
I wanted to submit the bug to LinkedIn and found that they have a bug bounty program. Unfortunately it was a private bounty and
you would only be added if you previously submitted bugs. I tried to get around it but it didn't work. After some thinking I
decided to not report it to LinkedIn privately but openly (parallel to this blog post). It is 2016 after all and if they don't want to
add me to their program that is their choice. In general I will likely not report bugs outside of a bug bounty
program if a private bug bounty program exists.
&lt;br&gt;&lt;Br&gt;
Another weekend comes I have some time and started playing with the bug again. Actually I started looking at my PoC from 2008
while trying to figure out if I report the bug to LinkedIn or not. 
After playing around for a bit I more or less get my old PoC working with the Twitter and LinkedIn apps. WOW!
&lt;br&gt;&lt;Br&gt;
Taking one step backwards. The original bug I reported to Twitter was triggering a phone call by visiting a website that
redirect to a TEL URL. One could do this with various techniques such as: http-meta refresh, iframe, 
setting document.location, window.location, or an HTTP redirect (Location header). This would simply dial a number. The victim would see the dialer
and the target number on the screen and of course could just cancel the call by pressing the big red button. Just causing the
call is already bad since an unobservant person will be baffled (why is my phone dialing some number).
&lt;br&gt;&lt;br&gt;
The beauty of my 2008 bug was that I could block the phone's UI for a few seconds and therefore prevent the user from canceling the call. 
I managed to abuse exactly the same trick to block the UI that I used in 2008. The trick is to cause the OS
to open a second application while the phone is dialing the given number. Opening applications is pretty straight forward,
you open a URL that causes the OS to spawn another application. This can be anything from the messages app (via the SMS: URL) 
or iTunes (via the itms-apps: URL).
You can pretty much get any application to launch that has a URI binding.
In 2008 I used a SMS URL with a really really long phone number to block the UI thread. 
My best guess on how this works is that the IPC subsystem actually has difficulties to move several kilobytes of URL data 
through the various layers into the app and the target app might also not be super happy about really large URLs. 
I ended-up with the code below. The code uses the combination of meta-refresh tag and window.location to execute the attack. 
The codes delays setting the window.location by 1.3 seconds to guarantee that the dialer is executed first. 
The delay cannot be too long otherwise the WebView will not execute the URL handler for launching the messages app. 
Basically you have to get the timing just right.
&lt;br&gt;&lt;br&gt;

&lt;img src=&quot;/images/webview_auto_dialer_poc.png&quot; width=&quot;100%&quot;&gt;&lt;br&gt;
The PoC to trigger this bug.&lt;Br&gt;&lt;br&gt;

Below two video demonstrations of this attack. You can clearly see that the UI is not responsive for a short amount of time. The
time is long enough to make somebody pickup on the other side (especially service hot lines automatically pickup).
&lt;br&gt;&lt;br&gt;
&lt;iframe width=&quot;560&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/oYDfe_P9uAQ&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;
&lt;br&gt;&lt;br&gt;
&lt;iframe width=&quot;560&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/WuFx4lxF8DY&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;
&lt;br&gt;&lt;br&gt;&lt;br&gt;

&lt;b&gt;Normal good app behavior:&lt;/b&gt;
&lt;br&gt;
Apps should normally check the URL schema before executing it and show the user a pop-up dialog before executing an app on the
device. Some examples are shown below:&lt;br&gt;&lt;Br&gt;

&lt;img src=&quot;/images/dialer_good.png&quot; width=&quot;50%&quot;&gt;&lt;br&gt;
Mobile Safari asking before calling the Apple Support number. This is how good apps should behave!&lt;br&gt;&lt;br&gt;
&lt;img src=&quot;/images/dialer_ok2.png&quot; width=&quot;50%&quot;&gt;&lt;br&gt;
Dropbox showing a warning but not showing the target number. Ok but could be better.&lt;br&gt;&lt;br&gt;
&lt;img src=&quot;/images/dialer_ok.png&quot; width=&quot;50%&quot;&gt;&lt;br&gt;
The Yelp app normally behaves like Safari but if you hit it with an HTTP redirect it does not show the target number.
I just included this for the fun of it.
&lt;br&gt;&lt;br&gt;

App developers should review their use of WebViews to determine if they are vulnerable to this attack.
Vulnerable apps need to be fixed. Service providers like Twitter and LinkedIn can inspect links posted to their
sites for containing malicious &lt;i&gt;code&lt;/i&gt; and prevent those links from being posted to their service.
&lt;br&gt;&lt;br&gt;

Apple should change the default behavior of WebViews to exclude execution of TEL URIs and make it an explicit feature to avoid this kind of issues
in the future. I reported this issue to Apple.&lt;br&gt;&lt;br&gt;

&lt;b&gt;References:&lt;/b&gt;
&lt;br&gt;
&lt;ul&gt;
[1] &lt;a href=&quot;http://news.softpedia.com/news/bug-bounty-hunter-launches-accidental-ddos-on-911-systems-via-ios-bug-509738.shtml&quot;&gt;Bug Bounty Hunter Launches Accidental DDoS Attack on 911 Systems via iOS Bug&lt;/a&gt; (softpedia) &lt;br&gt;&lt;br&gt;

[2] &lt;a href=&quot;http://arstechnica.com/security/2016/10/teen-arrested-for-iphone-hack-that-threatened-emergency-911-system/&quot;&gt;iPhone hack that threatened emergency 911 system lands teen in jail&lt;/a&gt; (ars technica) &lt;bR&gt;&lt;br&gt;

[3] Here my post to full-disclosure in Nov. 2008 after Apple fixed the bug in iOS 3.0 : &lt;A href=&quot;https://archive.cert.uni-stuttgart.de/bugtraq/2009/06/msg00190.html&quot;&gt;iPhone Safari phone-auto-dial vulnerability (original date: Nov. 2008)&lt;/a&gt;&lt;br&gt;&lt;Br&gt;

[4] Original TEL URI schema &lt;a href=&quot;https://tools.ietf.org/html/rfc2806&quot;&gt;RFC2806 URLs for Telephone Calls&lt;/a&gt;&lt;br&gt;&lt;br&gt;

[5] Updated TEL URI schema &lt;A href=&quot;https://tools.ietf.org/html/rfc3966&quot;&gt;RFC3966 The tel URI for Telephone Numbers&lt;/a?&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update October 2016</title>
 <pubDate>Tue, 18 Oct 2016 12:49:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2016/10/18#mobile_security_news_update_oct2016</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://pacsec.jp/speakers.html&quot;&gt;PacSec&lt;/a&gt; October, Tokyo.
Demystifying the Secure Enclave Processor by Mathew Solnik. 
Finding Vulnerabilities in Firefox for iOS by Muneaki Nishimura.
&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://www.spsm-workshop.org/2016/&quot;&gt;ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)&lt;/a&gt; October, Vienna Austria.
All talks are related to mobile security.&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://conferences.oreilly.com/security/network-data-security-ny/public/schedule/grid/public/2016-10-31&quot;&gt;O'Reilly Security Conference&lt;/a&gt; October, NYC.
Securing 85% of the world's smartphones by Adrian Ludwig.
How Plantronics honed its headsets to create secure wearables by Erik Perotti.
&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://www.syscan360.org/en/speakers/&quot;&gt;SyScan360&lt;/a&gt; November, Shanghai.
Browser Bug Hunting and Mobile by Francisco Alonso and Jaime Penalba.
Demystifying the Secure Enclave Processor by Mathew Solnik.
Running Code in the TrustZone Land by Edgar Barbosa.
Analysis of iOS 9.3.3 Jailbreak &amp; Security Enhancements of iOS 10 by Team Pangu.
Security Vulnerabilities on Online Payment: Summary and Detection by Zhang Qing and Bai Guangdong.
&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://kiwicon.org/the-con/talks/&quot;&gt;KiwiCon&lt;/a&gt; November Wellington, NZ.
Let's do the Timewarp Again by Karit.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
I'm going to be at the O'Reilly Security Conference on Monday the 31st (maybe also the other days). I super excited to speak at KiwiCon this year!&lt;br&gt;&lt;br&gt;

I'm interested in &lt;A href=&quot;https://fi.google.com/about/&quot;&gt;Google's Project Fi&lt;/a&gt; does anybody have insights into using it with non Android phones? I've found several posts on this topic but nothing convincing yet. Posts also seem conflicting.&lt;br&gt;&lt;br&gt;
&lt;br&gt;
Best of mobile security in pictures:&lt;br&gt;
&lt;img src=&quot;https://trtpost-wpengine.netdna-ssl.com/files/2016/10/pig_explosion.png&quot; width=&quot;50%&quot;&gt;&lt;br&gt;
source ThreatPost&lt;br&gt;

&lt;img src=&quot;https://pbs.twimg.com/media/Cu6e5fkVMAANBxC.jpg:large&quot; width=&quot;50%&quot;&gt;
&lt;br&gt;
I've seen this warning a lot in the last couple of weeks while traveling:
&lt;img src=&quot;http://www.northjersey.com/polopoly_fs/1.1677445.1476484360!/fileImage/httpImage/image.jpg_gen/derivatives/box_780/galaxynote7.jpg&quot; width=&quot;50%&quot;&gt;&lt;br&gt;
This is the real reason for the &lt;a href=&quot;http://www.samsung.com/us/note7recall/?cid=ppc-&quot;&gt;Galaxy Note 7 recall&lt;/a&gt;&lt;br&gt;
&lt;img src=&quot;https://pbs.twimg.com/media/Cul-fEoXYAAI7EY.jpg:large&quot; width=&quot;50%&quot;&gt;
&lt;br&gt;
While searching for the link to the recall:&lt;br&gt;
&lt;img src=&quot;/images/note7recall.png&quot;&gt;
&lt;br&gt;
&lt;br&gt;
Links
&lt;ul&gt;
&lt;a href=&quot;http://thehackernews.com/2016/10/android-banking-trojan.html&quot;&gt;Android Banking Trojan Tricks Victims into Submitting Selfie Holding their ID Card&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://sensepost.com/blog/2016/kwetza-infecting-android-applications/&quot;&gt;Kwetza: Infecting Android Applications&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://bbqand0days.com/Pork-Explosion-Unleashed/&quot;&gt;Pork Explosion Unleashed - Manufacturer Backdoor in the Foxconn Android bootloader&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.youtube.com/watch?time_continue=2&amp;v=l_BfjEF513k&quot;&gt;Decap of a SIM card&lt;/a&gt; (video)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://packetstormsecurity.com/files/139033&quot;&gt;Android Qualcomm GPS/GNSS Man-In-The-Middle&lt;/a&gt; (bug that is fixed now)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://media.wix.com/ugd/4e84e6_668d564cc447434a9a8fda3c13a63f6a.pdf&quot;&gt;KNOXout - Bypassing Samsung KNOX&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ScottyBauer/Android_Kernel_CVE_POCs/commit/21d9ce89d90fa34925de78462c243495448fbd96&quot;&gt;Android CVE PoCs for the October bulletin&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://osmocom.org/news/59&quot;&gt;Osmocom 3G circuit switched voice support with IuCS and Iuh&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://thehackernews.com/2016/09/hacking-d-link-wireless-router.html&quot;&gt;Multiple Backdoors found in D-Link DWR-932 B LTE Router&lt;/a&gt; (hardcoded admin:admin and root:1234)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.mobileworldlive.com/devices/news-devices/blackberry-axes-smartphone-business/&quot;&gt;BlackBerry axes smartphone business&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.wired.co.uk/article/security-google-chrome&quot;&gt;How to keep your Android phone safe from prying eyes&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.grahamcluley.com/xiny-android-trojan-evolves-root-phones-infect-processes/&quot;&gt;Xiny Android trojan evolves to root phones and infect system processes&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://citizenlab.org/2016/09/imsi-catcher-report-calls-transparency-proportionality-minimization-policies/&quot;&gt;IMSI Catcher Report Calls for Transparency, Proportionality, and Minimization Policies&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://old.iseclab.org/people/atrox/providerICdetection101.pdf&quot;&gt;The Messenger Shoots Back: Network Operator
Based IMSI Catcher Detection&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.the-parallax.com/2016/09/21/wipe-phone-resale/&quot;&gt;How to wipe your phone (or tablet) for resale&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.adaptivemobile.com/blog/icloud-ihack-ispam&quot;&gt;attack against compromised Apple accounts to perform SMS spamming&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://labs.mwrinfosecurity.com/advisories/android-premium-sms-warning-message-manipulation/&quot;&gt;Android Premium SMS Warning Message Manipulation&lt;/a&gt; (small android bug, now fixed)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://gist.github.com/myhndl/5f59666382bba938300c79d49fa167b3&quot;&gt;Nexus Support Lifecycle&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/CopperheadOS/status/784097298661806080&quot;&gt;Google has less control over Pixel devices than people claimed. HTC still signs the bootchain.&lt;/a&gt; (via @jcase)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://speakerdeck.com/retme7/talk-is-cheap-show-me-the-code&quot;&gt;Talk is Cheap, Show Me the Code - How we rooted 10 million phones with one exploit&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blogs.360.cn/360mobile/2016/10/11/android_new_permission_model/&quot;&gt;The new Android system permissions model analysis and early warning (in Chinese)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.royalholloway.ac.uk/isg/documents/pdf/technicalreports/2016/rhul-isg-2016-8-oliver-kunz.pdf&quot;&gt;Android full-disk encryption: a security assessment&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/strazzere/010Editor-stuff/commit/99c4b71b4ffbc3e3168139ff39e4eaa3421a7319&quot;&gt;Android cryptfs.bt for 101editor&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/horrorho/InflatableDonkey&quot;&gt;iOS9 iCloud backup retrieval proof of concept&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update September 2016</title>
 <pubDate>Tue, 20 Sep 2016 13:47:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2016/09/20#mobile_security_news_update_sep2016</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://www.blackhat.com/eu-16/&quot;&gt;Black Hat EU&lt;/a&gt; November, London UK. 
ARMAGEDDON: HOW YOUR SMARTPHONE CPU BREAKS SOFTWARE-LEVEL SECURITY AND PRIVACY
Speaker: Clementine Maurice, Moritz Lipp.
DETACH ME NOT - DOS ATTACKS AGAINST 4G CELLULAR USERS WORLDWIDE FROM YOUR DESK
Speaker: Bhanu Kotte, Dr. Silke Holtmanns, Siddharth Rao.
MOBILE ESPIONAGE IN THE WILD: PEGASUS AND NATION-STATE LEVEL ATTACKS
Speaker: Max Bazaliy, Seth Hardy.
POCKET-SIZED BADNESS: WHY RANSOMWARE COMES AS A PLOT TWIST IN THE CAT-MOUSE GAME
Speaker: Federico Maggi, Stefano Zanero.
ROOTING EVERY ANDROID: FROM EXTENSION TO EXPLOITATION
Speaker: Di Shen, Jiahong (James) Fang.
SIGNING INTO ONE BILLION MOBILE APP ACCOUNTS EFFORTLESSLY WITH OAUTH2.0
Speaker: Ronghai Yang, Wing Cheong Lau.
STUMPING THE MOBILE CHIPSET
Speaker: Adam Donenfeld.
WIFI-BASED IMSI CATCHER
Speaker: Piers O'Hanlon, Ravishankar Borgaonkar.
&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://pacsec.jp/speakers.html&quot;&gt;PacSec&lt;/a&gt; Tokyo Japan, October.
Demystifying the Secure Enclave Processor by Mathew Solnik.
&lt;/ul&gt;

The most interesting read this week was &lt;A href=&quot;https://arxiv.org/pdf/1609.04327v1.pdf&quot;&gt;The bumpy road towards iPhone 5c NAND mirroring&lt;/a&gt; a paper by Sergei Skorobogatov. In this paper he shows how to implement a NAND mirroring attack against an iPhone 5C. The basic idea behind this attack is &lt;i&gt;erase the PIN failure counter between each set of tries to avoid the artificial brute force delay and to avoid data deletion after N failed PINs&lt;/i&gt;. The paper goes into great detail on various problems he encountered while implementing the attack. I highly recommend reading this paper. The picture below is taken from this paper. &lt;br&gt;

&lt;img src=&quot;https://pbs.twimg.com/media/CsaWChSUMAAZepu.jpg&quot; width=&quot;50%&quot;&gt;&lt;br&gt;

Google's Project Zero now has an Android &quot;Prize&quot; for achieving RCE on a Nexus device with only knowing
it's email address or phone number. Apparently you &lt;a href=&quot;https://twitter.com/jduck/status/775768495904567296&quot;&gt;can't use a BTS&lt;/a&gt; (via @jduck) for this attack. Overall this looks interesting, I wonder if anybody is going to claim the money soon. Announcement: &lt;A href=&quot;https://googleprojectzero.blogspot.com/2016/09/announcing-project-zero-prize.html&quot;&gt;Project Zero Prize&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;

Links
&lt;ul&gt;
&lt;a href=&quot;https://www.adaptivemobile.com/blog/icloud-ihack-ispam&quot;&gt;iCloud, iHack, iSpam&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://labs.mwrinfosecurity.com/advisories/android-premium-sms-warning-message-manipulation/&quot;&gt;Android Premium SMS Warning Message Manipulation
&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/evilsocket/androswat&quot;&gt;tool to inspect, dump, modify, search and inject libraries into Android processes.
&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.arneswinnen.net/2016/09/how-my-rogue-android-app-could-monitor-brute-force-your-apps-sensitive-metadata/?utm_content=buffer3ce85&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer&quot;&gt;How My Rogue Android App Could Monitor &amp; Brute-force Your App's Sensitive Metadata&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://source.android.com/security/apksigning/v2.html#integrity-protected-contents&quot;&gt;APK Signature Scheme v2&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.forbes.com/sites/thomasbrewster/2016/09/06/google-android-one-photo-hack&quot;&gt;Just One Photo Can Silently Hack Millions Of Androids&lt;/a&gt; (@TimStrazz)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/moiji-mobile/diag-parser&quot;&gt;Parse the Qualcomm DIAG format and convert 2G, 3G and 4G radio messages to Osmocom GSMTAP for analysis in wireshark and other utilities.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://sektioneins.de/en/blog/16-09-02-pegasus-ios-kernel-vulnerability-explained.html&quot;&gt;PEGASUS iOS Kernel Vulnerability Explained&lt;/a&gt; by Stefan Esser&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://securityintelligence.com/undocumented-patched-vulnerability-in-nexus-5x-allowed-for-memory-dumping-via-usb/&quot;&gt;Undocumented Patched Vulnerability in Nexus 5X Allowed for Memory Dumping via USB&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.virusbulletin.com/blog/2016/september/vb2016-preview-mobile-applications-backdoor-internet-things/&quot;&gt;VB2016 preview: Mobile Applications: a Backdoor into Internet of Things?&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://koz.io/hiding-root-with-suhide/&quot;&gt;Hiding root with suhide&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://thehackernews.com/2016/09/xiaomi-android-backdoor.html&quot;&gt;Xiaomi Can Silently Install Any App On Your Android Phone Using A Backdoor&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/&quot;&gt;Reverse Engineering Xiaomi's Analytics app&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/how-a-third-party-app-store-abuses-apples-developer-enterprise-program-to-serve-adware/&quot;&gt;A Case of Misplaced Trust: How a Third-Party App Store Abuses Apple's Developer Enterprise Program to Serve Adware&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://source.android.com/security/encryption/file-based.html&quot;&gt;File-Based Encryption in Android 7&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.linux.com/news/linux-security-summit-videos&quot;&gt;Linux Security Summit Videos&lt;/a&gt; a lot is Android relevant&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_aafer.pdf&quot;&gt;Harvesting Inconsistent Security Configurations
in Custom Android ROMs via Differential Analysis&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://forum.xda-developers.com/showpost.php?p=68747345&amp;postcount=569&quot;&gt;suhide v0.51 released&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2016/september/introducing-blesuite-and-ble-replay-python-tools-for-rapid-assessment-of-bluetooth-low-energy-peripherals/&quot;&gt;Introducing BLESuite and BLE-Replay: Python Tools for Rapid Assessment of Bluetooth Low Energy Peripherals&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://security.samsungmobile.com/smrupdate.html#SMR-SEP-2016&quot;&gt;Samsung Android Security Updates
- September&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.cmcm.com/blog/en/security/2016-09-07/1027.html&quot;&gt;A Survey on Android ELF Malware&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://android-developers.blogspot.com.es/2016/09/security-enhancements-in-nougat.html&quot;&gt;Keeping Android safe: Security enhancements in Nougat&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.droidsec.org/nexus/&quot;&gt;Nexus Device Downloads&lt;/a&gt; via jduck @ droidsec&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update August 2016</title>
 <pubDate>Tue, 30 Aug 2016 13:30:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2016/08/30#mobile_security_news_update_august2016</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://www.blackhat.com/eu-16/briefings/schedule/index.html&quot;&gt;Black Hat EU&lt;/a&gt; November: ARMAGEDDON: HOW YOUR SMARTPHONE CPU BREAKS SOFTWARE-LEVEL SECURITY AND PRIVACY by Clementine Maurice and Moritz Lipp.
DETACH ME NOT - DOS ATTACKS AGAINST 4G CELLULAR USERS WORLDWIDE FROM YOUR DESK by Bhanu Kotte, Siddharth Rao and Silke Dr Holtmanns.
POCKET-SIZED BADNESS: WHY RANSOMWARE COMES AS A PLOT TWIST IN THE CAT-MOUSE GAME by Federico Maggi and Stefano Zanero.
STUMPING THE MOBILE CHIPSET by Adam Donenfeld.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.derbycon.com/schedule/&quot;&gt;DerbyCon&lt;/a&gt; September: Beyond The ?Cript: Practical iOS Reverse Engineering by Michael Allen.
 AWSh*t. Pay-as-you-go Mobile Penetration Testing by Nathan Clark.
Breaking Android Apps for Fun and Profit by Bill Sempf.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://2015.appsecusa.org/agenda/talks/&quot;&gt;AppSec USA&lt;/a&gt; November: QARK: Android App Exploit and SCA Tool by Tushar Dalvi and Tony Trummer.
SecureMe - Droid: Android Security Application by Vishal Asthana and Abhineet Jayaraj.
OWASP Reverse Engineering and Code Modification Prevention Project (Mobile) by Dave Bott and Jonathan Carter.
ShadowOS: Modifying the Android OS for Mobile Application Testing by Ray Kelly.

&lt;/ul&gt;
&lt;br&gt;

Apple now has a bug bounty program. Details were presented at Black Hat in Ivan Krstic's talk &lt;a href=&quot;https://www.blackhat.com/docs/us-16/materials/us-16-Krstic.pdf&quot;&gt;BEHIND THE SCENES OF IOS SECURITY&lt;/a&gt;. Also see &lt;a href=&quot;http://arstechnica.com/apple/2016/08/starting-this-fall-apple-will-pay-up-to-200000-for-ios-and-icloud-bugs/&quot;&gt;Starting this fall, Apple will pay up to $200,000 for iOS and iCloud bugs&lt;/a&gt; (via Ars).&lt;br&gt;&lt;Br&gt;

&lt;a href=&quot;http://arstechnica.com/gadgets/2016/07/motorola-confirms-that-it-will-not-commit-to-monthly-security-patches/&quot;&gt;Motorola confirms that it will not commit to monthly security patches&lt;/a&gt;. This is pretty bad since I actually liked their Pure Edition devices (devices that basically are just AOSP).&lt;br&gt;&lt;br&gt;

&lt;a href=&quot;http://android-developers.blogspot.com/2016/07/protecting-android-with-more-linux.html&quot;&gt;Protecting Android with more Linux kernel defenses&lt;/a&gt;. They added some features from Grsecurity. This makes me happy.&lt;br&gt;&lt;br&gt;

&lt;a href=&quot;http://nordic.businessinsider.com/salesforce-drops-android-phone-support-2016-7?r=US&amp;IR=T&quot;&gt;Google's Android has gotten so out of control that $55 billion Salesforce had to take drastic measures&lt;/a&gt;, basically Salesforce in the close future will only support specific Samsung Galaxy and Nexus devices. This is an interesting way to deal with the
very diverse Android ecosystem.&lt;br&gt;&lt;br&gt;

Pegasus Spyware / Trident for iOS was based on 3 vulnerabilities unsurprisingly a WebKit memory corruption,
a Kernel info leak, and a kernel memory corruption. The spyware was capable of accessing text messages, iMessages, calls, emails, logs, and more from apps including Gmail, Facebook, Skype, WhatsApp, Viber, Facetime, Calendar, Line, Mail.Ru, WeChat, Surespot, Tango, Telegram, and others. (Source: Lookout Technical Report). &lt;br&gt;&lt;br&gt;

&lt;a href=&quot;http://www.oversec.io/&quot;&gt;Oversec.io&lt;/a&gt; seems to implement &lt;a href=&quot;http://fc15.ifca.ai/preproceedings/paper_95.pdf&quot;&gt;our idea&lt;/a&gt; of mobile OTR on top of any messenger app. Oversec still looks very beta and I haven't tried it out. If anybody has tried it I would like to hear about it.&lt;br&gt;&lt;br&gt;

Pictures of the month:&lt;br&gt;
&lt;img src=&quot;/images/tomobile_snakes.png&quot; width=&quot;50%&quot;&gt; (source: @raviborgaonkari)&lt;br&gt;&lt;br&gt;
&lt;img src=&quot;/images/ios_ransomware.png&quot; width=&quot;50%&quot;&gt; (source: @marcwrogers)&lt;br&gt;&lt;br&gt;

Links
&lt;ul&gt;
&lt;a href=&quot;https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf&quot;&gt;Technical Analysis of Pegasus Spyware&lt;/a&gt; (pdf)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.androidpolice.com/2016/08/29/chainfire-releases-suhide-experimental-officially-unsupported-way-hide-root-status-app-app-basis/&quot;&gt; Chainfire suhide tries to hide your Android root access&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://events.linuxfoundation.org/sites/events/files/slides/Android-%20protecting%20the%20kernel.pdf&quot;&gt;Android: protecting the kernel&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://motherboard.vice.com/de/read/exklusiv-wie-das-bka-telegram-accounts-von-terrorverdaechtigen-knackt&quot;&gt;Wie das BKA Telegram-Accounts von Terrorverdaechtigen knackt&lt;/a&gt; (German)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://mobile.reuters.com/article/idUSKCN10D1AM&quot;&gt;Hackers accessed Telegram messaging accounts in Iran - researchers&lt;/a&gt; (same as a above but in English)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://gsec.hitb.org/materials/sg2016/D1%20-%20Adam%20Donenfeld%20and%20Yaniv%20Mordekhay%20-%20Stumping%20The%20Mobile%20Chipset.pdf&quot;&gt;Stumping the Mobile Chipset (Qualrooter)&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.zimperium.com/analysis-of-multiple-vulnerabilities-in-different-open-source-bts-products/&quot;&gt;Analysis of multiple vulnerabilities in different open source BTS products&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/dweinstein/node-google-play/releases/tag/v4.0.0&quot;&gt;gpapi (node lib for talking to Play Store)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://mista.nu/research/sep-paper.pdf&quot;&gt;Demystifying the Secure Enclave Processor&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/CopperheadOS/status/767130599060545541&quot;&gt;CopperheadOS ART no longer attempts to use executable code from /data/dalvik-cache, only boot.art &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/oldfresher/status/749837435974987776&quot;&gt;The slide and exploit of: A Way of Breaking Chrome's Sandbox in Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/docs/us-16/materials/us-16-Zhang-Adaptive-Kernel-Live-Patching-An-Open-Collaborative-Effort-To-Ameliorate-Android-N-Day-Root-Exploits.pdf&quot;&gt;Adaptive Kernel Live Patching: An Open Collaborative Effort to Ameliorate Android N-day Root Exploits&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://gsec.hitb.org/materials/sg2016/D2%20-%20Stefan%20Esser%20-%20iOS%2010%20Kernel%20Heap%20Revisited.pdf&quot;&gt;iOS 10 - Kernel Heap Revisited&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://gsec.hitb.org/materials/sg2016/whitepapers/Hacking%20Soft%20Tokens%20-%20Bernhard%20Mueller.pdf&quot;&gt;Hacking Soft Tokens (Android)&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://calebfenton.github.io/2016/08/21/understanding_dalvik_static_fields_2_of_2/&quot;&gt;Understanding Dalvik Static Fields part 2 of 2&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Hendrik-Schmidt-Brian-Butter-Attacking-BaseStations.pdf&quot;&gt;Attacking BaseStations&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/godless-mobile-malware-uses-multiple-exploits-root-devices/&quot;&gt;GODLESS Mobile Malware Uses Multiple Exploits to Root Devices (android)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/dxwu/AndroidBinder&quot;&gt;Android Binder Firewall&lt;/a&gt; (slides / paper / source)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.theregister.co.uk/2016/07/18/softbank_to_buy_arm_holdings_say_reports/&quot;&gt;ARM is bought by SoftBank&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://comsecuris.com/blog/posts/shannon/&quot;&gt;iREVERSE ENGINEERING AND EXPLOITING SAMSUNG'S SHANNON BASEBAND&lt;/a&gt; (tools)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://arxiv.org/pdf/1607.05171v1.pdf&quot;&gt;LTE security, protocol exploits and location tracking experimentation with low-cost software radio&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://speakerdeck.com/virtualabs/btlejuice-the-bluetooth-smart-mitm-framework#&quot;&gt;BtleJuice: The Bluetooth Smart MitM Framework&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.darknet.org.uk/2016/08/cuckoodroid-automated-android-malware-analysis/&quot;&gt;CuckooDroid: Automated Android Malware Analysis&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.usenix.org/sites/default/files/conference/protected-files/woot16_slides_drake.pdf&quot;&gt;Stagefright: An Android Exploitation Case Study&lt;/a&gt; (slides from usenix WOOT)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.adaptivemobile.com/blog/tracking-the-trackers&quot;&gt;Tracking the Trackers: The most advanced rogue systems exploiting the SS7 Network today&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.adaptivemobile.com/blog/ss7-security-putting-pieces-together&quot;&gt;SS7 Security : Putting the pieces together&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://arxiv.org/pdf/1608.03415v1.pdf&quot;&gt;ARMv8 Shellcodes from A to Z&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update July 2016</title>
 <pubDate>Tue, 12 Jul 2016 23:21:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2016/07/12#mobile_security_news_update_july_2016</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;http://www.summercon.org/presentations.html&quot;&gt;SummerCon&lt;/a&gt; July, Brooklyn, NY. 
THE FIREWALL ANDROID DESERVES: A CONTEXT-AWARE KERNEL MESSAGE FILTER AND MODIFIER by DAVID WU.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://defcon.org/html/defcon-24/dc-24-speakers.html&quot;&gt;Defcon&lt;/a&gt; August, Las Vegas. 
SITCH - Inexpensive, Coordinated GSM Anomaly Detection by ashmastaflash.
A Journey Through Exploit Mitigation Techniques in iOS by Max Bazaliy.
Stumping the Mobile Chipset by Adam Donenfeld.
How to Do it Wrong: Smartphone Antivirus and Security Applications Under Fire by Stephan Huber and Siegfried Rasthofer.
Discovering and Triangulating Rogue Cell Towers by JusticeBeaver (Eric Escobar).
Samsung Pay: Tokenized Numbers, Flaws and Issues and Salvador Mendoza.
Attacking BaseStations - an Odyssey through a Telco's Network by Henrik Schmidt and Brian Butterly.
Forcing a Targeted LTE Cellphone into an Unsafe Network by Haoqi Shan and Wanqiao Zhang.
&lt;/ul&gt;
&lt;br&gt;
Another month has passed and I'm super late again on this blog post.&lt;br&gt;&lt;br&gt;

HushCon EAST badges were super awesome (picture below) did some hacking on them with
Trammell Hudson: &lt;a href=&quot;https://trmm.net/Hushcon&quot;&gt;Hushcon 2016 pagers&lt;/a&gt;.&lt;br&gt;
&lt;img src=&quot;https://pbs.twimg.com/media/ClvfCnZUsAAphvH.jpg:large&quot; width=&quot;50%&quot;&gt; 
&lt;br&gt;&lt;br&gt;

The wait is over, here is the final blog post including source code on Qualcomm's TrustZone:
&lt;a href=&quot;https://bits-please.blogspot.de/2016/06/extracting-qualcomms-keymaster-keys.html&quot;&gt;Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption&lt;/a&gt; Source &lt;a href=&quot;https://github.com/laginimaineb/ExtractKeyMaster&quot;&gt;extractKeyMaster&lt;/a&gt;&lt;br&gt;&lt;br&gt;

The &lt;a href=&quot;https://source.android.com/security/bulletin/2016-07-01.html&quot;&gt;Android Security Bulletin July 2016&lt;/a&gt; fixes a really large number of bugs, including a Remote code execution vulnerability in Bluetooth and Remote code execution vulnerability in OpenSSL &amp; BoringSSL. It is really
good to see stuff being fixed and talked about in the open.&lt;br&gt;&lt;br&gt;

Summary on &lt;a href=&quot;https://blog.trailofbits.com/2016/07/11/why-i-didnt-catch-any-pokemon-today/&quot;&gt;Pokemon GO's permission to your Google Account&lt;/a&gt; by the guys from Trail of Bits.&lt;br&gt;&lt;br&gt;

Funny picture of the month:&lt;br&gt;
&lt;img src=&quot;http://i2.wp.com/www.funkyspacemonkey.com/wp-content/uploads/2012/10/xlarge.gif&quot;&gt;
&lt;br&gt;&lt;br&gt;

Links
&lt;ul&gt;
&lt;A href=&quot;https://comsecuris.com/slides/recon2016-breaking_band.pdf&quot;&gt;Breaking Band reverse engineering and exploiting the shannon baseband&lt;/a&gt; slides from Recon 2016&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://globalnetworkmap.vodafone.com/&quot;&gt;Vodafone Global Infrastructure Map&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://news.hitb.org/content/video-forcing-targeted-lte-cellphone-eavesdropping-network&quot;&gt;VIDEO: Forcing A Targeted LTE Cellphone Into An Eavesdropping Network&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;://android-developers.blogspot.de/2016/06/android-changes-for-ndk-developers.html&quot;&gt;Android changes for NDK developers&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://dlapk.etcandroid.com/apk/&quot;&gt;Need Android APK samples? `wget -r http://dlapk.etcandroid.com/apk/ ` and wait a few hours... Or until two people do it and server melts...&lt;/a&gt; (via @timstrazz)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://d3adend.org/blog/?p=589&quot;&gt;Android Anti-Hooking Techniques in Java&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ANSSI-FR/nogaxeh&quot;&gt;Tools for analyzing hexagon code&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://contagiominidump.blogspot.de/2016/06/hacking-team-crisis-android-samples.html&quot;&gt;Hacking Team / Crisis Android samples&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://pages.endgame.com/rs/627-YBU-612/images/hardware-assisted-rootkits-ARM_spisak.pdf&quot;&gt;HARDWARE-ASSISTED ROOTKITS &amp; INSTRUMENTATION: ARM Edition&lt;/a&gt; slides from recon 2016&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/godless-mobile-malware-uses-multiple-exploits-root-devices/&quot;&gt;GODLESS Mobile Malware Uses Multiple Exploits to Root Devices&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/raviborgaonkar/status/745039480906711041&quot;&gt;Silent OS 3.0 adds cellular IDS for weak nw encryption.&lt;/a&gt; via @raviborgaonkar&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/narseo/status/745083031803748352&quot;&gt;Most mobile apps dedicate at least 10% of their traffic to online tracking&lt;/a&gt; via @narseo&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/cx9527/strongdb&quot;&gt;Strongdb is a gdb plugin that is written in Python, to help with debugging Android Native program.The main code uses gdb Python API&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.silentsignal.eu/2016/06/16/accessing-local-variables-in-proguarded-android-apps/&quot;&gt;Accessing local variables in ProGuarded Android apps&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://threatpost.com/googles-android-rewards-program-pays-out-half-million-in-first-year/118751/&quot;&gt;GOOGLE'S ANDROID REWARDS PROGRAM PAYS OUT HALF MILLION IN FIRST YEAR&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/java-deobfuscator/deobfuscator&quot;&gt;This is an all-in-one Java deobfuscator which will deobfuscate code obfuscated by most obfuscators available on the market.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://synrg.csl.illinois.edu/vibraphone/paperdocs/VibraPhone_nirupam.pdf&quot;&gt;Listening through a Vibration Motor&lt;/a&gt; paper&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.elcomsoft.com/2016/06/ios-fingerprint-unlock-security/&quot;&gt;Fingerprint Unlock Security: iOS vs. Google Android (Part I)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.elcomsoft.com/2016/06/fingerprint-unlock-security-ios-vs-google-android-part-ii/&quot;&gt;Fingerprint Unlock Security: iOS vs. Google Android (Part II)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/libimobiledevice/libimobiledevice&quot;&gt;A cross-platform protocol library to communicate with iOS devices.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/strazzere/anti-emulator&quot;&gt;Android Anti-Emulator, originally presented at HitCon 2013: &quot;Dex Education 201: Anti-Emulation&quot;&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/CvvT/AppTroy&quot;&gt;An Online Analysis System for Packed Android Malware&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blogs.360.cn/360mobile/2016/06/21/analysis_of_diyuhuo/&quot;&gt;Android Trojan &quot;Hellfire&quot; modified system binaries, boot image, init.rc, SE policy rules, dm_verify, etc.&lt;/a&gt; via @claud_xiao&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/aramosf/recoversqlite/&quot;&gt;recover deleted information from sqlite files.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://bits-please.blogspot.de/2016/06/trustzone-kernel-privilege-escalation.html&quot;&gt;TrustZone Kernel Privilege Escalation (CVE-2016-2431)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ZSShen/ProbeDroid&quot;&gt;A dynamic binary instrumentation kit targeting on Android(Lollipop) 5.0 and above.&lt;a/&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.sit.fraunhofer.de/fileadmin/dokumente/Presse/teamsik_advisories_AV.pdf?_=1464692835&quot;&gt;(In-) Security of Security Applications&lt;/a&gt; paper&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.helpnetsecurity.com/2016/07/11/hacking-smartphones-voice-commands/&quot;&gt;Hacking smartphones via voice commands hidden in YouTube videos&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.heise.de/ct/ausgabe/2015-5-Sicherheitsluecken-bei-BMWs-ConnectedDrive-2536384.html&quot;&gt;Bugs in BMWs ConnectedDrive (exploitable via SMS)&lt;/a&gt; (German)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://securityintelligence.com/remote-code-execution-in-xiaomi-miui-analytics/#.V35lKNLX4Mk.twitter&quot;&gt;Remote Code Execution in Xiaomi MIUI Analytics&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://eprint.iacr.org/2016/677.pdf&quot;&gt;Breaking Into the KeyStore: A Practical Forgery
Attack Against Android KeyStore&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/secmob/mosec2016/blob/master/A%20Way%20of%20Breaking%20Chrome%E2%80%99s%20Sandbox%20in%20Android.pdf&quot;&gt;A Way of Breaking Chrome's Sandbox in Android&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://android-developers.blogspot.com/2016/07/changes-to-trusted-certificate.html&quot;&gt;Changes to Trusted Certificate Authorities in Android Nougat&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://code.facebook.com/posts/1754757044806180/&quot;&gt;Introducing OpenCellular: An open source wireless access platform&lt;/a&gt; (base station)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ScottyBauer/Android_Kernel_CVE_POCs/blob/master/CVE-2016-3797.c&quot;&gt;Android Kernel CVE POCs CVE-2016-3797&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ScottyBauer/Android_Kernel_CVE_POCs/blob/master/CVE-2016-3794.c&quot;&gt;Android Kernel CVE POCs CVE-2016-3794&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://gist.github.com/thestinger/b8502a881d871fbc75d91bc00576157b&quot;&gt;Proof of concept XOR canary support for LLVM&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/jianqiangzhao/mosec2016/blob/master/Advanced%20Android%20Root%EF%BC%9AHow%20To%20Bypass%20PXN.ppt&quot;&gt;Advanced Android Root : How To Bypass PXN&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/jianqiangzhao/CVE-2016-2434/blob/master/jni/pwn.c&quot;&gt;PoC for CVE-2016-2434&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.checkpoint.com/wp-content/uploads/2016/07/HummingBad-Research-report_FINAL-62916.pdf&quot;&gt;From HummingBad to Worse NEW DETAILS AND AN IN-DEPTH ANALYSIS OF THE HUMMINGBAD ANDROID MALWARE CAMPAIGN&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://thehackernews.com/2016/07/android-hacking-tool.html?utm_source=dlvr.it&amp;utm_medium=twitter&quot;&gt;This Android Hacking Group is making $500,000 per day&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://sourceforge.net/projects/openlte/files/&quot;&gt;open source 3gpp lte implementation&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.androidpolice.com/2016/07/07/lawsuit-reveals-silent-circles-blackphone-business-is-a-complete-and-utter-mess/&quot;&gt;Lawsuit reveals Silent Circle's Blackphone business is a complete and utter mess&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/antojoseph/diff-gui&quot;&gt;DIFFDroid :Dynamic Analysis for Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://koz.io/inside-safetynet-2/&quot;&gt;Inside SafetyNet - part 2&lt;/a&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update June 2016</title>
 <pubDate>Mon, 06 Jun 2016 17:51:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2016/06/06#mobile_security_news_update_june2016</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://www.blackhat.com/us-16/briefings/schedule/index.html&quot;&gt;Black Hat USA&lt;/a&gt; August, Las Vegas. 
1000 WAYS TO DIE IN MOBILE OAUTH by Eric Chen, Patrick Tague, Robert Kotcher, Shuo Chen, Yuan Tian, Yutong Pei. 
ADAPTIVE KERNEL LIVE PATCHING: AN OPEN COLLABORATIVE EFFORT TO AMELIORATE ANDROID N-DAY ROOT EXPLOITS
by Tao Wei, Yulong Zhang.
ATTACKING BLUETOOTH SMART DEVICES - INTRODUCING A NEW BLE PROXY TOOL
by Slawomir Jasek.
PANGU 9 INTERNALS by Hao Xu, Tielei Wang, Xiaobo Chen.
SAMSUNG PAY: TOKENIZED NUMBERS, FLAWS AND ISSUES by Salvador Mendoza.
CAN YOU TRUST ME NOW? AN EXPLORATION INTO THE MOBILE THREAT LANDSCAPE
by Josh Thomas.
DEMYSTIFYING THE SECURE ENCLAVE PROCESSOR
by Mathew Solnik, Tarjei Mandt.
BAD FOR ENTERPRISE: ATTACKING BYOD ENTERPRISE MOBILE SECURITY SOLUTIONS by Vincent Tan
THE ART OF DEFENSE - HOW VULNERABILITIES HELP SHAPE SECURITY FEATURES AND MITIGATIONS IN ANDROID by Nick Kralevich.
&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;https://www.shakacon.org/&quot;&gt;Shakacon&lt;/a&gt; July 13-14, Honolulu, HI. FRUIT VS ZOMBIE: DEFEAT NON-JAILBROKEN IOS MALWARE BY CLAUD XIAO. Bluetooth Low Energy...by SUMANTH NAROPANTH, CHANDRA PRAKASH GOPALAIAH &amp; KAVYA RACHARLA
&lt;/ul&gt;

Defcon still doesn't have the agenda or accepted talks up.
&lt;br&gt;&lt;br&gt;

The Qualcomm Mobile Security Summit was super awesome once again. Good talks, interesting hallway conversations and always good to see friends.
&lt;br&gt; &lt;img src=&quot;https://pbs.twimg.com/media/Ci1hR97UoAAOa3E.jpg&quot; width=&quot;50%&quot;&gt;
&lt;br&gt;&lt;br&gt;

SektionEins (Stefan Esser) release a &lt;A href=&quot;https://www.sektioneins.de/blog/16-05-16-howto-protect-yourself-with-system-and-security-info.html&quot;&gt;jailbreak and anomaly detection app for iOS&lt;/A&gt; and eventually got
&lt;A href=&quot;http://www.forbes.com/sites/thomasbrewster/2016/05/16/apple-stefan-esser-security-app-fight&quot;&gt;band from the AppStore by Apple&lt;/a&gt;. The speculation is that Apple wants to hide the fact that certain sandbox
and security features don't work as advertised and thus his App got band. The app likely wasn't band just
because it can detect a jailbreak since like every app does exactly this, including apps like WhatsApp. 
There are also several process list viewers for iOS.&lt;br&gt;
&lt;img src=&quot;https://pbs.twimg.com/media/Cj7XBVxWgAAJEvo.jpg&quot; width=&quot;50%&quot;&gt;&lt;br&gt;&lt;br&gt;

I finally could checkout a Blackberry PRIV. The actual hardware looks pretty sweet.
I got a quick demo of the security and privacy features added by RIM, specially &lt;A href=&quot;http://blogs.blackberry.com/2015/10/protect-your-privacy-with-dtek-by-blackberry/&quot;&gt;DTEK&lt;/a&gt;. I really liked the 
device security/privacy status overview, every phone should have that. &lt;br&gt;&lt;br&gt;

&lt;a &quot;href=&quot;https://twitter.com/laginimaineb/status/737051964857561093&quot;&gt;Qualcomm KeyMaster keys etracted from TrustZone&lt;/a&gt; waiting for the writeup. The previous blog posts where super good already, but this one should be really interesting.&lt;br&gt;&lt;br&gt;

Links
&lt;ul&gt;
&lt;A href=&quot;https://goatattack.com/&quot;&gt;goatattack send pictures of goats to your friends&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;://blogs.mcafee.com/mcafee-labs/android-banking-trojan-spylocker-targets-more-banks-in-europe/&quot;&gt;Android Banking Trojan SpyLocker Targets More Banks in Europe&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;://ge0n0sis.github.io/posts/2016/05/how-to-lock-the-samsung-download-mode-using-an-undocumented-feature-of-aboot/&quot;&gt;How to lock the samsung download mode using an undocumented feature of aboot&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://github.com/doridori/Android-Security-Reference&quot;&gt;Android-Security-Reference&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://github.com/Ostorlab/jniostorlab&quot;&gt;Script to enumerate JNI methods in ELF files.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://duo.com/blog/sixty-percent-of-enterprise-android-phones-affected-by-critical-qsee-vulnerability&quot;&gt;Sixty Percent of Enterprise Android Phones Affected by Critical QSEE Vulnerability&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://midlab.diag.uniroma1.it/articoli/matteo_pomilia_master_thesis.pdf&quot;&gt;A study on obfuscation techniques for Android malware&lt;/a&gt; (pdf)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://github.com/bunnyblue/DexExtractor&quot;&gt;Android dex file extractor, anti-bangbang (Bangcle)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://pentestcorner.com/introduction-to-fridump/&quot;&gt;Fridump: Dumping memory from iOS, Android and other applications using Frida&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://jeffvanderstoep.blogspot.com/2016/01/android-how-to-run-executable-from-adb.html&quot;&gt;Android: How to run your script/binary from adb in the application sandbox&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://copperhead.co/blog/2016/05/23/copperheados-store&quot;&gt;CopperheadOS online store now available&lt;/a&gt; You can now buy Nexus phones with CopperheadOS&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://blogs.mcafee.com/mcafee-labs/android-spyware-targets-security-job-seekers-in-saudi-arabia/&quot;&gt;Android Spyware Targets Security Job Seekers in Saudi Arabia&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://techcrunch.com/2016/05/31/sirin-labs-shows-off-14k-super-private-solarin-smartphone-on-sale-june-1/&quot;&gt;Sirin Labs shows off $14K, super private Solarin smartphone, on sale June 1&lt;/a&gt; Will it survive longer then BlackPhone?&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://keenlab.tencent.com/en/&quot;&gt;KeenTeam/KeenLab Blog&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://daoyuan14.github.io/papers/CoNEXT15_Poster_MopEye.pdf&quot;&gt;MopEye: Monitoring Per-app Network Performance with Zero Measurement Traffic&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.sstic.org/media/SSTIC2016/SSTIC-actes/how_to_not_break_lte_crypto/SSTIC2016-Article-how_to_not_break_lte_crypto-michau_devine.pdf&quot;&gt;How to not break LTE crypto&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://arxiv.org/pdf/1605.08567v1.pdf&quot;&gt;Secure Containers in Android: the Samsung KNOX Case Study&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://android-review.googlesource.com/#/c/235361/&quot;&gt;AOSP: recovery: Add support to brick a device.  &lt;/a&gt; (via @jcase)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.sics.se/sites/default/files/pub/sics.se/SecurityDay16/ravishankar_borgaonkar.pdf&quot;&gt;Security	in cellular-radio access networks&lt;/a&gt; Slides on protocol attacks against 3G/4G/LTE&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update May 2016</title>
 <pubDate>Fri, 06 May 2016 02:15:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2016/05/06#mobile_security_news_update_may2016</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://www.blackhat.com/us-16/briefings.html&quot;&gt;Black Hat USA&lt;/a&gt; Las Vegas. DEMYSTIFYING THE SECURE ENCLAVE PROCESSOR by Tarjei Mandt and Mathew Solnik. ADAPTIVE KERNEL LIVE PATCHING: AN OPEN COLLABORATIVE EFFORT TO AMELIORATE ANDROID N-DAY ROOT EXPLOITS by Tao Wei and Yulong Zhang. CAN YOU TRUST ME NOW? AN EXPLORATION INTO THE MOBILE THREAT LANDSCAPE by Josh Thomas. SAMSUNG PAY: TOKENIZED NUMBERS, FLAWS AND ISSUES by Salvador Mendoza.
&lt;Br&gt;&lt;br&gt;
&lt;A href=&quot;http://2016.appsec.eu/?page_id=43&quot;&gt;AppSec EU&lt;/a&gt; Rome. Don't Touch Me That Way. by David Lindner and Jack Mannino. Automated Mobile Application Security Assessment with MobSF by Ajin Abraham.  Why Hackers Are Winning The Mobile Malware Battle - Bypassing Malware Analysis Techniques by Yair Amit.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://conference.hitb.org/hitbsecconf2016ams/agenda/&quot;&gt;Hack in The Box&lt;/a&gt; Amsterdam, NL.  SANDJACKING: PROFITING FROM IOS MALWARE by Chilik Tamir. 
FORCING A TARGETED LTE CELLPHONE INTO AN EAVESDROPPING NETWORK
by Lin Huang. ADAPTIVE ANDROID KERNEL LIVE PATCHING
by Tim Xia and Yulong Zhang. COMMSEC TRACK: INSPECKAGE - ANDROID PACKAGE INSPECTOR
by Antonio Martins. &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://area41.io/agenda&quot;&gt;Area41&lt;/a&gt; 
When providing a native mobile application ruins the security of your existing Web solution by
Jeremy Matos. IMSecure - Attacking VoLTE and other Stuff by Hendrik Schmidt &amp; Brian Butterly.
Reversing Internet of Things from Mobile Applications by Axelle Apvrille.
&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://recon.cx/&quot;&gt;Recon&lt;/a&gt; Montreal, CA. Breaking Band by Nico Golde and Daniel Komaromy.
Hardware-Assisted Rootkits and Instrumentation: ARM Edition by Matt Spisak&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;
This was a long break, I was covered in work and had other things to do. But I'm not giving up this blog.
Sadly I missed a bunch of conferences earlier this year. Especially CanSecWest and Troopers/TelSecDay. TelSecDay
looked really awesome this year! Sad to have missed it.
&lt;br&gt;&lt;br&gt; 
&lt;b&gt;Work with me&lt;/b&gt; and other awesome people at &lt;a href=&quot;https://squareup.com/careers/jobs&quot;&gt;Square&lt;/a&gt; we are looking for
a bunch of different mobile security related people. Android and iOS!
&lt;br&gt;&lt;Br&gt;
For those who are interested in TrustZone or TrustZone implementations check out: &lt;a href=&quot;http://bits-please.blogspot.co.il/2016/05/war-of-worlds-hijacking-linux-kernel.html&quot;&gt;War of the Worlds - Hijacking the Linux Kernel from QSEE&lt;/a&gt; This blog has a lot of awesome research on TrustZone and Qualcomm's implementation.&lt;br&gt;&lt;br&gt; 

&lt;A href=&quot;http://www.cbsnews.com/videos/not-paid-rikers-island-hacking-your-phone/&quot;&gt;60 Minutes: shows how easily your phone can be hacked&lt;/a&gt;. As I said earlier on Twitter, this is as good as it gets on TV. All of the people on the show are pros (know all of them personally!). Of course if you are an expert yourself you will complain about anything 
shown on TV ;-)&lt;br&gt;&lt;br&gt;

Dilbert gets it:&lt;br&gt;&lt;img src=&quot;http://assets.amuniversal.com/6f234b60d8e901334e5c005056a9545d&quot; width=&quot;80%&quot;&gt;&lt;br&gt;&lt;br&gt;
Related to the iPhone will be bricked if the clock is set back too far.&lt;br&gt;
&lt;img src=&quot;https://pbs.twimg.com/media/CgB97e6UUAAqZWP.jpg&quot; width=&quot;50%&quot;&gt;&lt;br&gt;&lt;Br&gt;
&lt;br&gt;

Links
&lt;ul&gt;
&lt;a href=&quot;https://dpnishant.github.io/appmon/&quot;&gt;AppMon, GreaseMonkey for Android and iOS&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://t.co/egYB2Q7JMi&quot;&gt;Mobile Security Bullshit Bingo&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/dosomder/iovyroot&quot;&gt;CVE-2015-1805 root tool, Android Sony&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://securityaffairs.co/wordpress/46287/hacking/hacking-samsung-galaxy.html&quot;&gt;Hacking Samsung Galaxy via Modem interface exposed via USB&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://code.google.com/p/android/issues/detail?id=205565&quot;&gt;Overly restrictive SELinux filesystem permissions in Android N&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://packetstormsecurity.com/files/136632&quot;&gt;Android IOMX getConfig/getParameter Information Disclosure&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/NorthBit/Metaphor&quot;&gt;Metaphor - Stagefright with ASLR bypass&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://bnonews.com/news/index.php/mobile/id3969&quot;&gt;Brussels police were forced to use WhatsApp during attacks&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://theroot.ninja/disclosures/SAMDUNK_1.0-03262016.pdf&quot;&gt;eMMC backdoor leading to bootloader	unlock on Samsung Galaxy Devices&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://arstechnica.com/security/2016/03/rooting-bug-in-android-opens-nexus-phones-to-permanent-device-compromise/&quot;&gt;Android rooting bug opens Nexus phones to &quot;permanent device compromise&quot;&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://tracker.debian.org/news/755641&quot;&gt;You can install a GSM network with a single command now -  $sudo apt-get install gsm-network&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://researchcenter.paloaltonetworks.com/2015/03/android-installer-hijacking-vulnerability-could-expose-android-users-to-malware/&quot;&gt;Android Installer Hijacking Vulnerability Could Expose Android Users to Malware&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.evilsocket.net/2016/03/31/how-to-build-your-own-rogue-gsm-bts-for-fun-and-profit/#.Vv1sKAqhSiY.twitter&quot;&gt;How to Build Your Own Rogue GSM BTS for Fun and Profit (using a BladeF)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://pierrekim.github.io/blog/2016-04-04-quanta-lte-routers-vulnerabilities.html&quot;&gt;Multiple vulnerabilities found in Quanta LTE routers (backdoor, backdoor accounts, RCE, weak WPS ...)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://source.android.com/security/bulletin/2016-04-02.html&quot;&gt;Nexus Security Bulletin-April 2016&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;://source.android.com/security/bulletin/2016-05-01.html&quot;&gt;Android Security Bulletin-May 2016&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://calebfenton.github.io/2016/04/30/dalvik-virtual-execution-with-smalivm/&quot;&gt;Dalvik Virtual Execution with SmaliVM&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.fairphone.com/2016/04/28/releasing-the-fairphone-2-open-operating-system/&quot;&gt;Releasing the Fairphone 2 Open Operating System&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.bugcrowd.com/mobile-researchers-contest-2016?utm_campaign=Researcher%20Marketing&amp;utm_content=27249371&amp;utm_medium=social&amp;utm_source=twitter&quot;&gt;Calling all Mobile Researchers!&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.fortinet.com/post/analysis-of-cve-2016-2414-out-of-bound-write-denial-of-service-vulnerability-in-android-minikin-library-1&quot;&gt;Analysis of CVE-2016-2414 - Out-of-Bound Write Denial of Service Vulnerability in Android Minikin Library&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://marcograss.github.io/security/android/cve/2016/05/03/cve-2016-2443-msm-kernel-arbitrary-write.html&quot;&gt;[CVE-2016-2443] Qualcomm MSM debug fs kernel arbitrary write (Nexus 5, Nexus 7 2013 and maybe other models)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://android-review.googlesource.com/#/c/184840/&quot;&gt;Android is moving to enforcing storage verification at runtime (via @copperheadsec)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004&quot;&gt;Modem interface exposed via USB (samsung)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/docs/asia-16/materials/asia-16-He-Hey-Your-Parcel-Looks-Bad-Fuzzing-And-Exploiting-Parcelization-Vulnerabilities-In-Android.pdf&quot;&gt;Hey your parcel looks bad - Fuzzing and Exploiting parcel-ization vulnerabilities in Android&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://forum.xda-developers.com/crossdevice-dev/sony/iovyroot-temp-root-tool-t3349597&quot;&gt;iovyroot - (temp) root tool &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/Fuzion24/AndroidKernelExploitationPlayground&quot;&gt;Linux Kernel Exploitation on Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.insinuator.net/2016/02/ss7maper-a-ss7-pen-testing-toolkit/&quot;&gt;ss7MAPer - A SS7 pen testing toolkit&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blogs.blackberry.com/2016/03/beating-expectations-android-security-patching-for-priv/&quot;&gt;Beating Expectations: Android Security Patching for PRIV&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/secmob/cansecwest2016/blob/master/Pwn%20a%20Nexus%20device%20with%20a%20single%20vulnerability.pdf&quot;&gt;Pwn a Nexus device with a single vulnerability&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://embeddedideation.com/2016/03/10/exploring-the-physical-address-space-on-ios/&quot;&gt;Exploring the Physical Address Space on iOS&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update March 2016</title>
 <pubDate>Tue, 08 Mar 2016 21:43:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2016/03/08#mobile_security_newsupdate_march2016</link>
 <description>
Conferences
&lt;ul&gt;
&lt;A href=&quot;https://cansecwest.com/speakers.html&quot;&gt;CanSecWest&lt;/a&gt; Vancouver, Canada.  Don't Trust Your Eye: Apple Graphics Is Compromised! - Liang Chen + Marco Grassi.  Having fun with secure messengers and Android Wear - Artem Chaykin. Pwn a Nexus device with a single vulnerability - Guang Gong. &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.troopers.de/troopers16/agenda/&quot;&gt;Troopers&lt;/a&gt; Heidelberg, Germany. QNX: 99 Problems but a Microkernel ain't one! Georgi Geshev, Alex Plaskett.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;

Looks like I will go to very few conferences this year.&lt;br&gt;&lt;Br&gt;

We finally published our paper on Android application analysis support using intelligent GUI stimulation.
The work &lt;a href=&quot;https://mulliner.org/collin/publications/fc2016curiousdroid.pdf&quot;&gt;CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes&lt;/a&gt; uses / enhances &lt;a href=&quot;https://anubis.iseclab.org/&quot;&gt;Andrubis&lt;/a&gt;.
&lt;br&gt;&lt;Br&gt;

Excellent post on Apple vs FBI by Dan Guido: &lt;a href=&quot;https://blog.trailofbits.com/2016/02/17/apple-can-comply-with-the-fbi-court-order/&quot;&gt;Apple can comply with the FBI court order&lt;/a&gt;&lt;br&gt;&lt;Br&gt;

&lt;br&gt;
Links
&lt;ul&gt;
&lt;A href=&quot;http://support.blackberry.com/kb/articleDetail?articleNumber=000038051&quot;&gt;BlackBerry powered by Android Security Bulletin - March 2016&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://source.android.com/security/bulletin/2016-03-01.html&quot;&gt;Nexus Security Bulletin - March 2016&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://securelist.com/analysis/publications/74032/attack-on-zygote-a-new-twist-in-the-evolution-of-mobile-threats/&quot;&gt;Attack on Zygote: a new twist in the evolution of mobile threats&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://the-parallax.com/2016/03/07/how-to-fbi-proof-your-iphone/&quot;&gt;How to FBI-proof your iPhone
&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://arm.ninja/2016/03/04/reverse-engineering-samsung-s6-modem/&quot;&gt;Reverse Engineering Samsung S6 Modem&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://courses.csail.mit.edu/6.857/2014/files/17-cyrbritt-webbhorn-specter-dmiao-hacking-fitbit.pdf&quot;&gt;Security Analysis of Wearable Fitness Devices (Fitbit)&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://www.internetsociety.org/sites/default/files/blogs-media/practical-attacks-against-privacy-availability-4g-lte-mobile-communication-systems.pdf&quot;&gt;Practical Attacks Against Privacy and Availability in
4G/LTE Mobile Communication Systems&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://translate.wooyun.io/2016/02/04/41.html&quot;&gt;GPS hacking (PART 1)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://calebfenton.github.io/2016/02/21/how-does-dalvik-handle-this-registers/?utm_content=buffer666a3&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer&quot;&gt;How does Dalvik handle 'this' registers?
&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://researchcenter.paloaltonetworks.com/2016/02/pirated-ios-app-stores-client-successfully-evaded-apple-ios-code-review/&quot;&gt;Pirated iOS App Store's Client Successfully Evaded Apple iOS Code Review&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.nowsecure.com/blog/2016/02/18/filesystem-monitor-tool-for-ios-and-android/&quot;&gt;FileSystem Monitor Tool For iOS and Android&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://twitter.com/EnglishRussia1/status/697017291494596608&quot;&gt;Scammers use mobile POS terminals to scan people cards via NFC (paypass,paywave etc) technology without them knowing&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://code.google.com/p/google-security-research/issues/detail?id=727&quot;&gt;Android: Calling getpidcon for One Way Binder Transactions Returns Wrong Security Context&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://koz.io/network-security-policy-configuration-for-android-apps/&quot;&gt;Network Security Policy configuration for Android apps&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://github.com/pylerSM/NoDeviceCheck&quot;&gt;[Xposed module] Disable device compatibility check&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://community.arm.com/groups/processors/blog/2014/12/02/the-armv8-a-architecture-and-its-ongoing-development&quot;&gt;The ARMv8-A architecture and its ongoing development&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://www.jssec.org/dl/android_securecoding_en.pdf&quot;&gt;Android Secure Coding&lt;/a&gt; Free PDF Book&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://arm.ninja/2016/03/07/decoding-syscalls-in-arm64/&quot;&gt;Decoding Syscalls in ARM64&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://www.tobem.com/cyberwar/adafruit-bluefruit-le-sniffer-bluetooth-low-energy-ble-4-0-nrf51822-v1-0-ada2269/&quot;&gt;Adafruit Bluefruit LE Sniffer – Bluetooth Low Energy (BLE 4.0)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update February 2016</title>
 <pubDate>Tue, 09 Feb 2016 17:46:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2016/02/09#mobile_security_news_update_feb2016</link>
 <description>
Conferences:
&lt;ul&gt;
&lt;A href=&quot;https://www.syscan360.org/en/schedule/&quot;&gt;SyScan360&lt;/a&gt; March, Singapore. Browsers Bug Hunting and Mobile device exploitation by Francisco Alonso. &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/asia-16/briefings.html&quot;&gt;Black Hat Asia&lt;/a&gt; March, Singapore. ANDROID COMMERCIAL SPYWARE DISEASE AND MEDICATION by Mustafa Saad. ENTERPRISE APPS: BYPASSING THE IOS GATEKEEPER by Avi Bashan &amp; Ohad Bobrov. HEY YOUR PARCEL LOOKS BAD - FUZZING AND EXPLOITING PARCEL-IZATION VULNERABILITIES IN ANDROID by Qidan He. SU-A-CYDER: HOMEBREWING MALWARE FOR IOS LIKE A B0$$! by Chilik Tamir.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.coseinc.com/en/index.php?rt=pwn0rama&quot;&gt;Mobile Pwn0rama&lt;/a&gt; the SyScan version of mobile pwn2own. Very cool!
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://copperhead.co/blog/2016/02/08/beta&quot;&gt;CopperheadOS&lt;/a&gt; beta released for Nexus 5, 9, and 5X. I need to buy a new
phone to try this out. For those who don't know about CopperheadOS, it is a hardened Android. I was waiting for something like
this for a long time. Not as a user more like &lt;i&gt;somebody should really do this&lt;/i&gt;. Anyway, looks pretty cool.&lt;br&gt;&lt;br&gt;
Last weekend I published a write-up on &lt;A href=&quot;https://www.mulliner.org/blog/blosxom.cgi/security/CVE-2016-0728_vs_android.html&quot;&gt;CVE-2016-0728 vs Android&lt;/a&gt;. The TL;DR is that this vulnerability was totally over hyped for Android. There is no practical impact
for the Android platform.
&lt;br&gt;&lt;Br&gt;

Links:
&lt;ul&gt;
&lt;a href=&quot;https://gist.github.com/AKosterin/af8c2dd2aa372c99b507&quot;&gt;New Dexguard String decoder for JEB 1.5. Tested on GFE 3.1.3. This release auto parse decoder function.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://bits-please.blogspot.com/2016/01/android-privilege-escalation-to.html&quot;&gt;Android privilege escalation to mediaserver from zero permissions&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.fredericjacobs.com/blog/2016/01/14/sms-login/&quot;&gt;On SMS logins: an example from Telegram in Iran&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0001&quot;&gt;URL filtering in kernel land: what could possibly go wrong?&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://dev.seemoo.tu-darmstadt.de/bcm/bcm-public&quot;&gt;NexMon enables the monitor mode of the bcm4339 Wi-Fi chip on the Nexus 5.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://android.googlesource.com/kernel/msm/+/68cdc8df1cb6622980b791ce03e99c255c9888af%5E!/&quot;&gt;diff of the wifi driver source that nicely shows the bug&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://github.com/samsung/adbi&quot;&gt;Samsung has DBI tool for Android based on Capstone&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://twitter.com/esizkur/status/694628511617794048&quot;&gt;Android Wifi kernel RC details&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://plus.google.com/+Chainfire/posts/FjWwBm9vGyj&quot;&gt;FlashFire updated to v0.26 - brings Marshmallow support. Can flash your monthly Nexus OTA and keep root&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.nowsecure.com/blog/2015/06/15/a-pattern-for-remote-code-execution-using-arbitrary-file-writes-and-multidex-applications/&quot;&gt;A Pattern for Remote Code Execution using Arbitrary File Writes and MultiDex Applications&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/nowsecure/android-rce-multidex-and-zip-files&quot;&gt;PoC code for android RCE with multidex and ZIP files&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/anestisb/android-prepare-vendor&quot;&gt;Set of scripts to automate AOSP compatible vendor blobs generation from factory images&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.nccgroup.trust/uk/our-research/a-few-notes-on-usefully-exploiting-libstagefright-on-android-5x/&quot;&gt;A few notes on usefully exploiting libstagefright on Android 5.x&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.ee.columbia.edu/~roger/ShmooCon_talk_final_01162016.pdf&quot;&gt;LTE security and protocol exploits&lt;/A&gt; (slides from ShmooCon 2016)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://newandroidbook.com/tools/dextra.html?17&quot;&gt;Dextra for #OAT/#ART/#DEX reversing: now with better disasm,bug fixes.&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://github.com/Fuzion24/boot-unlocker/blob/master/app/src/main/java/net/segv11/bootunlocker/bootLoader_OnePlusOne.java&quot;&gt;check the BootUnlocker source for oneplus for details&lt;/a&gt; (checks if for tamper flag)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://usmile.at/blog/open-mobile-api-implementations-affected-by-code-injection-vulnerability&quot;&gt;RCE in Open Mobile API&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://github.com/testwhat/SmaliEx&quot;&gt;Deoptimize odex from oat.&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://www.exploit-db.com/exploits/39340/&quot;&gt;Android sensord Local Root Exploit&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://cxsecurity.com/issue/WLB-2016010190&quot;&gt;Android ADB Debug Server Remote Payload Execution&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;http://blog.checkpoint.com/2016/02/04/hummingbad-a-persistent-mobile-chain-attack/&quot;&gt;HummingBad: A Persistent Mobile Chain Attack&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://github.com/vaioco/art-hooking-vtable&quot;&gt;ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.&lt;/a&gt; I totally need to check this out!&lt;br&gt;&lt;Br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>CVE-2016-0728 vs Android</title>
 <pubDate>Sat, 06 Feb 2016 19:09:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2016/02/06#CVE-2016-0728_vs_android</link>
 <description>
&lt;A href=&quot;http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/&quot;&gt;CVE-2016-0728&lt;/a&gt;
has made some headlines in the &lt;i&gt;security&lt;/i&gt; world since it is a relatively easy to exploit Linux local privilege escalation vulnerability.
Perception Point (the company who found the vulnerability) claimed that approximately 66% of all Android devices are vulnerable to this
issue, if this is true that would have quite some impact on Android users. Perception Point did not evaluate if the vulnerability is 
actually present and exploitable on the Android platform. A lot of people, including myself, were very curious about the impact of this
bug on Android. Here is a write-up of my investigation of the impact of CVE-2016-0728 on the Android world. &lt;b&gt;TL;DR impact almost none!&lt;/b&gt;
(please continue reading).
&lt;br&gt;&lt;br&gt;

When I first heard about this vulnerability I modified the PoC and tried to validate the presence of the vulnerability using various Android devices. I could
not find any device that contained the vulnerability. I had access to several Nexus devices and number of Samsung devices. After failing blindly
I started investigating the details. I also asked friends who do a lot of Android work to see if they had tried and/or made it work. Nobody
was able to find a device that was actual vulnerable. I only found one person who claimed to gotten the exploit working on LG device.
According to his &lt;a href=&quot;http://forum.xda-developers.com/general/rooting-roms/cve-2016-0728-android-t3299641/post64945478#post64945478&quot;&gt;post&lt;/a&gt;
it takes more than 6 hours to trigger the vulnerability and only one out of three tries he got it working. This alone gives you a good indication
on the &lt;i&gt;impact&lt;/i&gt; on this vulnerability. The battery of most phones will run out in less than 6 hours due to running an application that
constantly hits the kernel.&lt;br&gt;&lt;br&gt;

Here a technical rundown of why this vulnerability is not an issue for the vast majority of Android devices.&lt;br&gt;

&lt;h2&gt;Mitigating Factors&lt;/h2&gt;

&lt;h3&gt;Kernel Version&lt;/h3&gt;
The vulnerability supposingly was introduced with Kernel version 3.8 and later. A lot of Android 5.0 devices run a 3.4 Kernel.

&lt;h3&gt;Kernel Configuration&lt;/h3&gt;
CONFIG_KEYS:&lt;br&gt;
The code containing the vulnerability is part of the key retention service of the Linux kernel. The service is only present if the kernel was built with CONFIG_KEYS enabled. Looking at the default AOSP kernel config you can see that CONFIG_KEYS is not enabled. Android devices that are based on the 
&lt;a href=&quot;https://source.android.com/devices/tech/config/kernel.html&quot;&gt;AOSP kernel config&lt;/a&gt; do not contain the vulnerable code, as a result they are not affected by this vulnerability. Further, not all versions of the key retention service contained the vulnerable code, this again reduces the number of affected devices. When looking at the overall device population the presence of the key retention service provides an upper bound for the number of affected devices.
&lt;br&gt;&lt;br&gt;

We can also use the &lt;A href=&quot;https://census.tsyrklevich.net&quot;&gt;Android Census&lt;/a&gt; to identify which devices and firmware versions use kernels with CONFIG_KEYS enabled. If CONFIG_KEYS is enabled, the /proc/keys directory will be present. Based on this data, only 125 out of the 480 unique Android installations examined have /proc/keys and therefore, CONFIG_KEYS enabled in their kernels.
&lt;br&gt;&lt;br&gt;

KALLSYMS:&lt;br&gt;
A portable and automated exploit (based on the PoC) would require access to /proc/kallsyms to acquire memory addresses of kernel code. Recent Android versions zero out
the actual memory addresses when kallsyms is read by a non uid=0 process.&lt;br&gt;&lt;br&gt;

&lt;h3&gt;SELinux&lt;/h3&gt;
Android 4.4 (KitKat) and later include SELinux, but Android 5.0 (Lollipop) notably requires SELinux to be in enforcing mode instead of permissive as was the case in Android 4.4. SELinux on Android reduces the attack surface of the Linux kernel by restricting the use of a number of kernel services to trusted applications. 
In this case, the SELinux policy in the Android Open Source Project (AOSP) and on Nexus devices restricts access to kernel keyring objects from the &lt;i&gt;untrusted_app&lt;/i&gt; domain and this prevents apps from the Play Store or other sources from triggering or exploiting the vulnerability. For example, when an app tries to execute the keyctl system call to create or access a keyring object, the system call is denied and an SELinux kernel error is logged to the system log:

&lt;pre&gt;
[ 3683.432511] type=1400 audit(1453676165.345:15): avc: denied 
{ search } for pid=7848 comm=&quot;PoCtest&quot; 
scontext=u:r:untrusted_app:s0:c512,c768 
tcontext=u:r:untrusted_app:s0:c512,c768 tclass=key permissive=0
&lt;/pre&gt;

The public PoC exploit uses SysV IPC (msgget) to allocate the memory chunk that is passed to the vulnerable code.  The SELinux policy on Android 5.0 and upwards blocks SysV IPC and thus blocks the method of obtaining a usable memory chunk that is used by the PoC exploit. Below is the output of SELinux blocking the call to msgget taken from the Linux kernel ring buffer on a Android 5.0 device. I tested the this on a Nexus 5x running Android 6 and on a Nexus 7 running Android 5.0running the PoC from an adb shell, system log output below:

&lt;pre&gt;
&lt;4&gt;[59201.392059] type=1400 audit(1453400116.210:13): avc: 
denied { create } for pid=21470 comm=&quot;PoCtest&quot; 
scontext=u:r:shell:s0 tcontext=u:r:shell:s0 tclass=msgq
&lt;/pre&gt;

The PoC can be adapted to use a different method for allocating memory rather than SysV IPC msgget, but historically Android malware only uses of-the-shelf exploits, if they
use any vulnerability at all.&lt;br&gt;&lt;Br&gt;

The Android device ecosystem, however, is much more varied and diverse than the stock AOSP tree and Nexus devices that follow it very closely. In particular, SEAndroid policies in the wild often add more types, domains, type transitions, and rules to the AOSP SELinux policies.  
Using the Android Census we find 160 sepolicies have key rules from untrusted_app.

&lt;h2&gt;Results&lt;/h2&gt;
There are several limiting factors that make this vulnerability a non issue for Android:
&lt;ul&gt;
&lt;li&gt;SELinux policies from Android 5.0 and later block access to the vulnerable kernel code&lt;/li&gt;
&lt;li&gt;Kernel versions used by various Android devices are either too old or don't use CONFIG_KEYS&lt;/li&gt;
&lt;li&gt;The exploit requires 30 minutes to run on a 3.0 Ghz Intel i7 and according to &lt;a href=&quot;http://forum.xda-developers.com/general/rooting-roms/cve-2016-0728-android-t3299641/post64945478#post64945478&quot;&gt;XDA developers&lt;/a&gt; it took several tries and a runtime of 6 hours to get this working on an Android device&lt;/a&gt;
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;

The conclusion I draw is that this vulnerability will not pose a serious risk to the Android ecosystem due to the mitigating factors described above.
Maybe individual devices do contain the vulnerability but 
the worst case scenario is that the owner of the device will use the bug to root his own device. Given he is very patient and can live without using
his device for 6 hours or more. One thing that is certain is that the percentage given by Perception Point is absolutely not true and should not
haven been repeated by everyone who reported on this.
&lt;br&gt;&lt;Br&gt;

Acknowledgments:
&lt;ul&gt;
This blog post is based on discussions I had with various people, most notably Dino Dai Zovi and Janek Klawe.
Vlad Tsyrklevich deserves massive credit for his Android Census database, a super valuable source for this kind of research.
&lt;/ul&gt;
&lt;br&gt;
Links:
&lt;ul&gt;
&lt;a href=&quot;http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/&quot;&gt;ANALYSIS AND EXPLOITATION OF A LINUX KERNEL VULNERABILITY (CVE-2016-0728)&lt;/a&gt; original blog post by Perception Point.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://plus.google.com/+AdrianLudwig/posts/KxHcLPgSPoY&quot;&gt;Adrian Ludwig's (head of Android security) statement about this vulnerability&lt;/a&gt;
&lt;a href=&quot;http://forum.xda-developers.com/general/rooting-roms/cve-2016-0728-android-t3299641/post64945478#post64945478&quot;&gt;XDA Developers post on this topic&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/nardholio/cve-2016-0728&quot;&gt;PoC exploit tailored for Android&lt;/b&gt; (source + makefile)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://source.android.com/devices/tech/config/kernel.html&quot;&gt;AOSP Kernel Config&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;&quot;https://census.tsyrklevich.net&quot;&gt;Android Census&lt;/a&gt; by Vlad Tsyrklevich&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update January 2016</title>
 <pubDate>Mon, 18 Jan 2016 15:43:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2016/01/18#mobile_security_news_update_January2016</link>
 <description>
Conferences:
&lt;ul&gt;
&lt;a href=&quot;https://www.blackhat.com/asia-16/briefings.html&quot;&gt;Black Hat Asia&lt;/a&gt; March 29, Singapore. 
ANDROID COMMERCIAL SPYWARE DISEASE AND MEDICATION by Mustafa Saad. 
ENTERPRISE APPS: BYPASSING THE IOS GATEKEEPER by Avi Bashan  &amp; 	Ohad Bobrov.
HEY YOUR PARCEL LOOKS BAD - FUZZING AND EXPLOITING PARCEL-IZATION VULNERABILITIES IN ANDROID by Qidan He.
SU-A-CYDER: HOMEBREWING MALWARE FOR IOS LIKE A B0$$! by Chilik Tamir.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
I guess it is still too early in the year for conference programs. ShmooCon just concluded, Infiltrate doesn't have any mobile talks, and SyScan didn't post accepted talks yet. This weekend I attended the first BSidesNYC. The conference was pretty good, some expected and some unexpected good talks. The conference venue was pretty nice and spacious. I will go again.
&lt;br&gt;&lt;br&gt;

If you are into NFC research checkout: &lt;a href=&quot;https://www.kickstarter.com/projects/1980078555/chameleonmini-a-versatile-nfc-card-emulator-and-mo&quot;&gt;ChameleonMini - A Versatile NFC Card Emulator&lt;/a&gt; a new kickstarter project. The guys who run it definitely know what they are doing.
&lt;br&gt;&lt;br&gt;

Links:
&lt;ul&gt;
&lt;A href=&quot;http://www.theregister.co.uk/2016/01/18/updated_android_malware_steals_voice_two_factor_authentication/&quot;&gt;Updated Android malware steals voice two factor authentication&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://news.vice.com/video/phone-hackers-britains-secret-surveillance&quot;&gt;Phone Hackers: Britain's Secret Surveillance&lt;/a&gt; Video by vice&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/android-based-smart-tvs-hit-by-backdoor-spread-via-malicious-app/&quot;&gt;Android-based Smart TVs Hit By Backdoor Spread Via Malicious App&lt;/a&gt; (not mobile but close enough)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://yawnbox.com/index.php/2015/03/14/create-an-anonymous-textsecure-and-redphone-phone-number/&quot;&gt;Create an anonymous Signal phone number w/ Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://people.csail.mit.edu/mjulia/publications/Covert_Communication_in_Mobile_Applications_2015.pdf&quot;&gt;Covert Communication in Mobile Applications&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.sentinelone.com/blog/vulnerability-in-blackphone-puts-devices-at-risk-for-takeover/&quot;&gt;Vulnerability in Blackphone Puts Devices at Risk for Takeover&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/yosriayed/GSM-scanner&quot;&gt;spectrum monitoring system for GSM providers&lt;/a&gt; (a tool)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://source.android.com/security/bulletin/2016-01-01.html&quot;&gt;Nexus Security Bulletin - January 2016&lt;/a&gt; has a bunch of critical stuff&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://t.co/vFATxEa7sy&quot;&gt;(Un)Trusted Execution Environments&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://www.mac4n6.com/blog/2015/12/20/parsing-the-ios-frequent-locations&quot;&gt;Parsing iOS Frequent Locations&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://parthasarathyalwar.com/2015/12/22/a-forensic-analysis-of-tinder-ios/&quot;&gt;A Forensic Analysis of Tinder (iOS)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.youtube.com/watch?v=HuPIhiFZoaI&amp;feature=youtu.be&amp;a&quot;&gt;How to Bypass Factory Reset Protection on your Nexus 6P, 5X, 5, &amp; 6&lt;/a&gt; (YouTube video)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://marcograss.github.io/security/android/cve/2016/01/15/cve-2015-7292-amazon-kernel-stack-buffer-overflow.html&quot;&gt;[CVE-2015-7292] Amazon Fire Phone kernel stack based buffer overflow
&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/jcase/status/687500933543100416&quot;&gt;Mediatek/Obi nerfed ALL property space security any user can control any property, even ro ones&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://android-review.googlesource.com/#/c/196090/&quot;&gt;CopperheadOS's OpenBSD malloc port uncovered a use-after-free in Android's fancy new over-the-air update sorcery&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://twitter.com/hashcat/status/685612442114768897&quot;&gt;Added support to crack Android FDE (Samsung DEK) to oclHashcat v2.10! 171kH/s @ 290x, 217.7 kH/s @ 980Ti&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.payatu.com/damn-insecure-and-vulnerable-app/&quot;&gt;DIVA (Damn insecure and vulnerable App) for Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://github.com/CalebFenton/dex-oracle&quot;&gt;A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis&lt;/a&gt; and the &lt;a href=&quot;http://www.slideshare.net/tekproxy/tetcon-2016&quot;&gt;slides&lt;/a&gt; for it.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/jowinter/qemu-trustzone&quot;&gt;Experimental version of QEMU with basic support for ARM TrustZone (security extensions)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.slideshare.net/gottsc_r/how-to-not-disable-selinux&quot;&gt;How to NOT disable SELinux on Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update December 2015</title>
 <pubDate>Thu, 24 Dec 2015 11:35:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2015/12/24#mobile_security_update_dec2015</link>
 <description>
I've gotten a little lazy with this blog but I promise I will post more often in 2016.&lt;br&gt;&lt;br&gt;

Conferences
&lt;ul&gt;
&lt;a href=&quot;https://events.ccc.de/congress/2015/Fahrplan/events.html&quot;&gt;32c3&lt;/a&gt; 27-30 December, Hamburg, Germany.  
Iridium Update: more than just pagers by Schneider and Sec.
Running your own 3G/3.5G network: OpenBSC reloaded by LaForge.
(Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking (in German) by Vincent Haupert.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://shmoocon.org/schedule/&quot;&gt;ShmooCon&lt;/a&gt; January 15 - 17, Washington D.C.
Hiding from the Investigator: Understanding OS X and iOS Code Signing to Hide Data by Joshua Pitts.
LTE Security and Protocol Exploits by Roger Piqueras Jover.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/bsidesnyc/BSidesNYC2016/wiki/Abstracts&quot;&gt;BSides NYC&lt;/a&gt; January 16, NYC.
99 Problems but a Microkernel ain't one! by Alex Plaskett.
Mobile implants in the age of cyber-espionage by Dmitry Bestuzhev.
&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://www.blackhat.com/asia-16/briefings.html&quot;&gt;Black Hat ASIA&lt;/a&gt; March 31 - April 1, Singapore.
HEY YOUR PARCEL LOOKS BAD - FUZZING AND EXPLOITING PARCEL-IZATION VULNERABILITIES IN ANDROID by Qidan He.
&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://www.internetsociety.org/events/ndss-symposium-2016/ndss-programme&quot;&gt;NDSS 2016&lt;/a&gt; February 21 - 24, San Diego. Has a good number of Android related papers. Some titles look quite interesting.
&lt;/ul&gt;
&lt;br&gt;

As I said before, I'm neither attending 32c3 nor Shmoocon. I'll be attending BSides NYC tho.
&lt;br&gt;&lt;br&gt;

Google &lt;a href=&quot;https://github.com/nowsecure/android-vts/issues/101&quot;&gt;suspended Android-vts&lt;/a&gt; the
only up to date Android device vulnerability scanner. No idea if Google would allow it back after fixing the issues.
On the other side I rather have a tool that can find a large number vulnerabilities rather than having a crippled version in the Play Store.

&lt;br&gt;&lt;br&gt;
Jobs
&lt;ul&gt;
&lt;A href=&quot;https://jobs.jobvite.com/paloaltonetworks/job/oGdH1fwl&quot;&gt;Palo Alto Networks - Mobile Malware Research Engineer&lt;/a&gt;&lt;br&gt;&lt;br&gt;
We at &lt;a href=&quot;http://hire.jobvite.com/CompanyJobs/Careers.aspx?c=q8Z9VfwV&amp;page=Jobs&quot;&gt;Square&lt;/a&gt; are looking for Security people and Engineers.
&lt;/ul&gt;

&lt;br&gt;&lt;br&gt;
Links
&lt;ul&gt;
&lt;a href=&quot;https://github.com/lukeFalsina/Grab-n-Run&quot;&gt;Grab'n Run, a simple and effective Java Library for Android projects to secure dynamic code loading.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://ge0n0sis.github.io/posts/2015/12/exploring-androids-selinux-kernel-policy/&quot;&gt;Exploring Android's SELinux Kernel Policy&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.ioactive.com/2015/12/by-ariel-sanchez-two-years-ago-idecided.html&quot;&gt;(In)secure iOS Mobile Banking Apps - 2015 Edition&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://security.samsungmobile.com/smrupdate.html#SMR-DEC-2015&quot;&gt;Samsung patched the Pwn2Own baseband bug within 1 month&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/google/android-classyshark&quot;&gt;Android-classyshark for looking at Android APKs/decompiling&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ManyFace/ExtractDexFromOat&quot;&gt;This tool is used to extract dex files from oat file.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://sites.google.com/site/droidnotsecure/home&quot;&gt;Android Data Residue Vulnerability&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.mobilephonedevelopment.com/archives/2491&quot;&gt;New Android 'enjarify' Decompile Tool&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://forum.xda-developers.com/showpost.php?p=64027688&amp;postcount=4064&quot;&gt;Droid Turbo Bootloader Unlock on now with SunShine 3.2 Beta&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.wpinternals.net/&quot;&gt;Windows Phone Internals&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-459832.htm&quot;&gt;Huawei is disclosing 'Security Advisory' for baseband bugs&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://thenextweb.com/google/2015/11/22/google-can-remotely-bypass-the-passcode-of-at-least-74-of-android-devices-if-ordered/&quot;&gt;Google can remotely bypass the passcode of at least 74% of Android devices if ordered&lt;/a&gt; I thought this was more widely known?&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://archive.hack.lu/2015/HT_Android_hack_lu2015_v1.0.pdf&quot;&gt;Hacking Team - how they infected	your Android device by 0days&lt;/a&gt; (slides from Hack.Lu)&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://ieeexplore.ieee.org/xpl/login.jsp?reload=true&amp;tp=&amp;arnumber=7345408&amp;url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel7%2F7293439%2F7345233%2F07345408.pdf%3Farnumber%3D7345408&quot;&gt;Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access&lt;/a&gt; (paper) &lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://github.com/flankerhqd/CVE-2015-6620-POC&quot;&gt;POC for CVE-2015-6620, AMessage unmarshal arbitrary write&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://researchcenter.paloaltonetworks.com/2015/12/ios-trojan-tinyv-attacks-jailbroken-devices/&quot;&gt;iOS Trojan 'TinyV' Attacks Jailbroken Devices&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.thecobraden.com/2015/12/attacking-bound-services-on-android.html?m=1&quot;&gt;Attacking Bound Services on Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://bytecodeviewer.com/&quot;&gt;BytecodeViewer - A Java Reverse Engineering Suite. GUI Java And APK Decompiler, Editor, Debugger And More&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/docs/us-15/materials/us-15-Bobrov-Certifi-Gate-Front-Door-Access-To-Pwning-Millions-Of-Androids.pdf&quot;&gt;Using &quot;system&quot; privileges by abusing mobile remote support tools &lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/raviborgaonkar/status/674192862985195520&quot;&gt;List of Android apps to detect fake mobile towers&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://pandazheng.blog.163.com/blog/static/1768172092015118105051451&quot;&gt;Defeating iOS Jailbreak detection for Mobile Application Testing&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://rotlogix.com/2015/12/06/abusing-android-clipdata/&quot;&gt;Abusing Android ClipData&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.channelnewsasia.com/news/singapore/50-smartphone-users-in/2308976.html&quot;&gt;50 smartphone users in Singapore hit by malware targeting mobile banking customers&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://github.com/ucsb-seclab/baredroid&quot;&gt;BareDroid allows for bare-metal analysis on Android devices.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.g3rt.nl/android-lollipop-encryption-user-interface-flaw.html&quot;&gt;Apparently if install an accessibility service, FDE password is reset to default on Android 5.x+.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://research.g0blin.co.uk/capstone-engine-on-android/?utm_content=bufferd2af9&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer&quot;&gt;Capstone Engine on Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update November 2015</title>
 <pubDate>Thu, 19 Nov 2015 01:56:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2015/11/19#mobile_security_news_update_Nov2015</link>
 <description>
Conferences
&lt;ul&gt;
upcoming: 32C3 (December), ShmooCon (January)
&lt;/ul&gt;
&lt;br&gt;

CFPs
&lt;ul&gt;
&lt;A href=&quot;https://www.syscan360.org/en/cfp/&quot;&gt;SyScan 360&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;

&lt;b&gt;$10 Android Phone&lt;/b&gt;
&lt;a href=&quot;http://motherboard.vice.com/read/walmarts-10-smartphone-has-better-specs-than-the-original-iphone&quot;&gt;Walmart has a $10 Android phone&lt;/a&gt;.
It is an LG device with Android 4.4 &lt;A href=&quot;http://www.walmart.com/ip/45822125?u1=8a1835348ae611e59da8e6fb3409ace10000&amp;oid=289955.1&amp;wmlspartner=lw9MynSeamY&amp;sourceid=07079407560200143898&amp;affillinktype=10&amp;veh=aff&quot;&gt;specs&lt;/a&gt;. I agree with Patrick McCanna on &lt;a href=&quot;https://twitter.com/PatrickMcCanna/status/666282674256875521&quot;&gt;Smartphones @ featurephone prices will be a significant milestone towards monetizing mobile hacking.&lt;/a&gt; These prices really mean everybody is going to have a smartphone. Like everybody. I ordered two of those to play with.&lt;br&gt;&lt;br&gt;

&lt;b&gt;Mobile pwn2own&lt;/b&gt;: two interesting results. (1)  baseband of a Samsung S6 Edge, the payload was able to redirect incoming calls. This was done by my buddies Nico Golde and Daniel Komaromy. Here a &lt;A href=&quot;https://twitter.com/dragosr/status/664636566342471680&quot;&gt;picture&lt;/a&gt; of their setup.
Story by various sites: &lt;A href=&quot;http://www.theregister.co.uk/2015/11/12/mobile_pwn2own1/&quot;&gt;1&lt;/a&gt;, 
&lt;a href=&quot;http://www.heise.de/security/meldung/Telefonate-belauscht-Samsung-Galaxy-S6-in-Wanze-verwandelt-2919809.html&quot;&gt;2&lt;/a&gt; (German),
&lt;a href=&quot;http://securityaffairs.co/wordpress/41923/hacking/snooping-samsung-s6.html&quot;&gt;3&lt;/a&gt;.
(2) drive by APK install on Nexus 6 without user interaction by Guang Gong. tweets: &lt;A href=&quot;https://twitter.com/dragosr/status/664365754989477888&quot;&gt;1&lt;/a&gt;
&lt;a href=&quot;https://twitter.com/dragosr/status/664366711697571841&quot;&gt;2 (with picture)&lt;/a&gt;.
&lt;br&gt;&lt;Br&gt;
&lt;b&gt;LTE Security&lt;/b&gt;: pretty interesting talk and paper about LTE design and implementation vulnerabilities. &lt;a href=&quot;https://www.blackhat.com/docs/eu-15/materials/eu-15-Borgaonkar-LTE-And-IMSI-Catcher-Myths.pdf&quot;&gt;slides&lt;/a&gt; &lt;A href=&quot;https://www.blackhat.com/docs/eu-15/materials/eu-15-Borgaonkar-LTE-And-IMSI-Catcher-Myths-wp.pdf&quot;&gt;white paper&lt;/a&gt;. Blogpost by the same people: &lt;A href=&quot;http://blog.se-sy.org/2015/10/lte-attacks-2015.html&quot;&gt;Practical attacks against 4G (LTE) access network protocols&lt;/a&gt;. One thing I didn't notice is how cheap LTE research is already. Their setup is just over $1000, which seems rather cheap for LTE.&lt;br&gt;

&lt;br&gt;
&lt;br&gt;
Jobs
&lt;ul&gt;
We at &lt;a href=&quot;http://hire.jobvite.com/CompanyJobs/Careers.aspx?c=q8Z9VfwV&amp;page=Jobs&quot;&gt;Square&lt;/a&gt; are looking for engineers, jobs should be super interesting for those who read this blog!&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://jobs.gsma.com/vacancies/438/cyber_security_director/londonhomeworker/?utm_campaign=Connect_Vacancy%20bulletin_6thNov2015&amp;utm_medium=email&amp;utm_source=Eloqua&amp;Job+Description+-+Cyber+Security+Director+-+London%2FHomeworker=Learn+more&amp;elq=25efd86b576d4818bbcb0812d78762f6&amp;elqCampaignId=4697&amp;elqaid=13698&amp;elqat=1&amp;elqTrackId=53463113d95a44768be56419d6235133&quot;&gt;the GSMA is looking for a Cyber Security Director&lt;/a&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;
&lt;br&gt;
Links
&lt;ul&gt;
&lt;A href=&quot;http://blogs.360.cn/360mobile/2015/11/16/analysis_of_fakedebuggerd_d/&quot;&gt;FakeDebuggerd.D, AFAIK the first Android Trojan infecting system binaries just like traditional virus&lt;/a&gt; (in Chinese)&lt;br&gt;&lt;Br&gt;
tiny USB drive sized &lt;A href=&quot;https://twitter.com/ABI_JoeHoffman/status/666760538836234240&quot;&gt;Qualcomm LTE base station&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://security.samsungmobile.com/smrupdate.html&quot;&gt;Samsung Mobile Security Blog&lt;/a&gt; I didn't know this existed&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://events.ccc.de/congress/2015/wiki/Static:GSM&quot;&gt;32c3 again has a GSM network&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://blog.quarkslab.com/remote-code-execution-as-system-user-on-android-5-samsung-devices-abusing-wificredservice-hotspot-20.html&quot;&gt;Remote Code Execution as System User on Android 5 Samsung Devices abusing WifiCredService (Hotspot 2.0)&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://twitter.com/jkwhar/status/661949445286817792&quot;&gt;Hey @sprint @sprintcare, what's up with sprint installing MDM profile on a new iPhone 6s at the store?&lt;/a&gt; sprint seems to install MDM profiles on to iPhones at the store, more investigation needed!&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://securityaffairs.co/wordpress/41681/hacking/100m-android-device-baidu-moplus-sdk.html&quot;&gt;A vulnerability known as Wormhole affects the Baidu Moplus SDK and potentially exposes more than 100 Million users to cyber attacks.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.nowsecure.android.vts&quot;&gt;VTS for Android&lt;/a&gt; vulnerability scanner for Android that is constantly updated!&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://googleprojectzero.blogspot.com/2015/11/hack-galaxy-hunting-bugs-in-samsung.html&quot;&gt;Hack The Galaxy: Hunting Bugs in the Samsung Galaxy S6 Edge&lt;/A&gt; Google P0 takes a look at the S6 and finds 11 high impact issues.&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://twitter.com/Zerodium/status/661240316331069443&quot;&gt;The Zerodium 1 Million $ iOS 0day bounty was claimed on Nov. 2&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2015-0001&quot;&gt;ZipFury: Yet another Zip arbitrary file write with system privileges (Samsung Android)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://forum.xda-developers.com/apps/supersu/wip-android-6-0-marshmellow-t3219344&quot;&gt;SafetyNet doesn't detect a device as rooted if using the new system-less SuperSU&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://arxiv.org/abs/1510.05497&quot;&gt;Characterizing SEAndroid Policies in the Wild&lt;/a&gt; (paper)&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://github.com/seandroid-analytics/seal&quot;&gt;SEAL: SEAndroid Analytics Library for live device analysis&lt;/a&gt; (tool)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://github.com/puppykitten/lte&quot;&gt;Long Term Exploitation - LTE security&lt;/a&gt; (slides)&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://www.androidpolice.com/2015/11/15/psa-unlocking-the-nexus-6p-bootloader-requires-the-new-flashing-command-likely-to-become-common-for-many-devices-in-the-future/&quot;&gt;Nexus 6P has two levels of bootloader unlocking&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;http://www.androidpolice.com/2015/11/14/the-xposed-framework-and-installer-are-now-available-for-android-6-0-devices/&quot;&gt;Xposed now for Android 6.0&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.tomshardware.com/news/copperhead-nexus-more-secure-priv,30565.html&quot;&gt;Copperhead CTO: Nexus Phones Already More Secure Than BlackBerry Priv&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://github.com/AndroBugs/AndroBugs_Framework&quot;&gt;AndroBugs Framework is an efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications. No need to install on Windows.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://arxiv.org/pdf/1511.00444v2.pdf&quot;&gt;android app capable of &quot;self-compilation, mutation and viral spreading&quot; (paper)&lt;/a&gt; and &lt;a href=&quot;https://github.com/Tribler/self-compile-Android#readme&quot;&gt;code&lt;/A&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://www.securingapps.com/blog/Cybsec15_android_appsec.pdf&quot;&gt;When providing a native mobile app ruins the security of your existing web solution&lt;/a&gt;(slides)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://www.androidpolice.com/2015/11/06/why-does-my-android-phone-have-efuses-and-why-should-i-care-about-them/&quot;&gt;Why Does My Android Phone Have eFuses And Why Should I Care About Them?&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://groups.google.com/forum/#!topic/afl-users/UL46o4kTeFw&quot;&gt;AFL on Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://www.androidpolice.com/2015/11/03/as-of-android-6-0-oems-will-be-required-to-provide-secure-factory-reset-on-their-devices-if-they-havent-already/&quot;&gt;As Of Android 6.0, OEMs Will Be Required To Provide Secure Factory Reset On Their Devices (If They Haven't Already)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://groups.google.com/forum/#!topic/android-security-updates/GwZn7sixask&quot;&gt;Nexus Security Bulletin November 2015&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://groups.google.com/forum/#!msg/android-security-discuss/MLIKsy7quq0/opkxz5GYCwAJ&quot;&gt;Remote attestation for TEEs and Verified Boot will be possible on Android N&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://insights.ubuntu.com/2015/10/15/update-on-ubuntu-phone-security-issue&quot;&gt;the Ubuntu phone as security issues&lt;/a&gt; &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://arxiv.org/pdf/1511.04897v1.pdf&quot;&gt;ARMageddon: Last-Level Cache Attacks on Mobile Devices&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://labs.integrity.pt/articles/google-aosp-email-app-html-injection-2/&quot;&gt;GOOGLE AOSP EMAIL APP HTML INJECTION&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://drive.google.com/file/d/0B_thUFNIy8TdZk9aWjdsN1lvdlU/view&quot;&gt;The Terminator to Android Hardening Services&lt;/a&gt; (slides)&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://www.reddit.com/r/sysadmin/comments/3s6329/500000_get_requests_to_a_random_jpeg_per_day/&quot;&gt;Android developer hotlinks an image on some guy's server, DDoS's it. He has no idea who to contact.&lt;/a&gt; (reddit)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://events.linuxfoundation.org/sites/events/files/slides/slides_10.pdf&quot;&gt;ARMv8 has unprivileged cache flush instructions.&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://github.com/spion/adbfs-rootless&quot;&gt;Mount Android phones on Linux with adb. No root required.&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://github.com/blackberry/android-linux-kernel/blob/msm8992/AAC724/arch/arm64/configs/bbryqc8992_defconfig#L643-L683&quot;&gt;BlackBerry's PaX / grsecurity configuration&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://ruxcon.org.au/assets/2015/slides/ruxcon-2016-dowd.pptx&quot;&gt;MalwAirDrop: Compromising iDevices via AirDrop&lt;/a&gt; (slides)&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://whispersystems.org/blog/just-signal/&quot;&gt;Android now has Signal too&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://www.elcomsoft.com/news/619.html#.VkxO9DZPSbg.twitter&quot;&gt;don't jailbreak your iPhone (or else forensics)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.wsj.com/articles/islamic-state-teaches-tech-savvy-1447720824&quot;&gt;... encrypted com app security scorecard ... &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update October 2015 part II</title>
 <pubDate>Fri, 23 Oct 2015 03:19:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2015/10/23#mobile_security_update_Oct2015_part2</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://www.ekoparty.org/charla.php?id=35&quot;&gt;ekoparty&lt;/a&gt; October 21-23, Buenos Aires.
ARM disassembling with a twist by Agustin Gianni and Pablo Sole.
Exploiting GSM and RF to Pwn you Phone by Manuel Moreno and Francisco Cortes.
Faux Disk Encryption: Realities of Secure Storage on Mobile Devices by Drew Suarez and Daniel Mayer.
New Age Phreacking: Tacticas y trucos para fraudes en Wholesale by David Batanero.
&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://2015.hackitoergosum.org/&quot;&gt;Hackito Ergo Sum&lt;/a&gt; October 29-30, Paris, France. 
Malicious AVPs: Exploits to the LTE Core by Laurent Ghigonis &amp; Philippe Langlois.
Android malware that won't make you fall asleep by By Lukasz Siewierski.
&lt;/ul&gt;
&lt;br&gt;

The RIM BlackBerry &lt;a href=&quot;http://blogs.blackberry.com/2015/10/how-to-pre-register-for-the-latest-priv-info/&quot;&gt;PRIV&lt;/a&gt; looks
like a real interesting device. The PRIV &lt;A href=&quot;http://blogs.blackberry.com/2015/10/priv-is-for-private-how-blackberry-secures-the-android-platform/&quot;&gt;seems to focus on security&lt;/a&gt;.
The website claims a hardend linux kernel, and indeed they seem to run a &lt;a href=&quot;https://grsecurity.net/&quot;&gt;grsec&lt;/a&gt; kernel as you can see in
this picture (lower left corner) posted on the Crackberry forum. Some comments about this in this &lt;a href=&quot;https://twitter.com/esizkur/status/657182642216017920&quot;&gt;series of tweets&lt;/a&gt;.&lt;br&gt;

&lt;img src=&quot;http://forums.crackberry.com/attachments/blackberry-priv-f440/371993d1442609757t-blackberry-safeguard-grsecurity-confirmed-slider-blackberry-venice-leak-1-copy.jpg&quot; width=&quot;70%&quot;&gt;&lt;br&gt;
&lt;br&gt;&lt;br&gt;

There is a new security news outlet with focus on the consumer angle it is called &lt;a href=&quot;http://parallaxsecuritynews.com/&quot;&gt;The Parallax&lt;/a&gt;.
It is super new and does not have many articles yet. But I think the consumer focus could be interesting.
&lt;br&gt;&lt;br&gt;&lt;br&gt;

Job Section (just because I know about a bunch of stuff)
&lt;ul&gt;
&lt;A href=&quot;https://jobsearch.siemens.biz/career?career_ns=job_listing&amp;company=Siemens&amp;navBarLevel=JOB_SEARCH&amp;rcm_site_locale=de_DE&amp;career_job_req_id=206654&quot;&gt;Intern at Siemens with focus on Mobile Security&lt;/a&gt; (Germany)&lt;br&gt;&lt;br&gt;
I know that &lt;a href=&quot;https://www.usebutton.com/&quot;&gt;Button Inc&lt;/a&gt; in NYC is looking for mobile developers.&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://hire.jobvite.com/CompanyJobs/Careers.aspx?c=q8Z9VfwV&amp;page=Jobs&quot;&gt;Square&lt;/a&gt; is looking to hire multiple security people.&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;

Links
&lt;ul&gt;
&lt;a href=&quot;http://pangu8.com/&quot;&gt;Pangu iOS 9 jailbreak&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://play.google.com/store/apps/details?id=org.nick.cryptfs.passwdmanager&quot;&gt;Cryptfs Password Manager with Android 6 support&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.symantec.com/connect/blogs/android-banking-trojan-delivers-customized-phishing-pages-straight-cloud&quot;&gt;Android banking Trojan delivers customized phishing pages straight from the cloud&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://cure53.de/pentest-report_openkeychain.pdf&quot;&gt;OpenKeychain Audit&lt;/a&gt; (PDF)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/nil1666/AuditDroid&quot;&gt;The AuditDroid Project is a fully functional and self-contained environment for learning about Android security&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/nowsecure/android-vts&quot;&gt;Android Vulnerability Test Suite - now detects CVE-2015-6602&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://code.google.com/p/android/issues/detail?id=189183&quot;&gt;Attackers with brief physical access can enable WiFi MITM on Android 6.0&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/rednaga/native-shim&quot;&gt;A &quot;shim&quot; for loading native jni files for Android active debugging&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://forensics.spreitzenbarth.de/2015/10/05/androguard-a-simple-step-by-step-guide/&quot;&gt;Androguard: A simple step by step guide&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/bkerensa/status/650038903403974656&quot;&gt;Interesting Twitter thread about HTC and Security updates for Android including the HTC USA President&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://rotlogix.com/2015/10/04/same-s-t-different-browser/&quot;&gt;Same Sh*t Different Android Browser&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://arstechnica.com/gadgets/2015/10/nexus-5x-and-nexus-6p-review-the-true-flagships-of-the-android-ecosystem/3/&quot;&gt;Nexus 5X and Nexus 6P review: The true flagships of the Android ecosystem&lt;/a&gt; contains a large section disk encryption performance on various Android devices&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.xda-developers.com/a-look-at-marshmallow-root-verity-complications/&quot;&gt;A Look at Marshmallow Root &amp; Verity Complications&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://kernsec.org/files/lss2015/lss2015_selinuxinandroidlollipopandm_smalley.pdf&quot;&gt;SELinux in Android Lollipop and Marshmallow&lt;/a&gt; (PDF)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://gsec.hitb.org/materials/sg2015/D2%20-%20Ryan%20Welton%20and%20Marco%20Grassi%20-%20Current%20State%20of%20Android%20Privilege%20Escalation.pdf&quot;&gt;Current State of Android Privilege Escalation&lt;/a&gt; (PDF)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://forum.xda-developers.com/nexus-7/development/rom-aosp-4-4-4-grouper-dexhunter-t3226060&quot;&gt;AOSP 4.4.4 ROM for grouper (Nexus7) with DexHunter automatic unpacker built in&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ac-pm/SSLUnpinning_Xposed&quot;&gt;Android Xposed Module to bypass SSL certificate validation (Certificate Pinning).&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://koz.io/using-safetynet-securely-in-your-android-app/&quot;&gt;Using Android's tamper detection securely in your app&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/MindMac/AndroidEagleEye&quot;&gt;An Xposed and adbi based module which is capable of hooking both Java and Native methods targeting Android OS.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://forum.xda-developers.com/android/apps-games/app-microg-gmscore-floss-play-services-t3217616/post63131189#post63131189&quot;&gt;microG GmsCore is a FLOSS (Free/Libre Open Source Software) framework to allow applications designed for Google Play Services to run on systems, where Play Services is not available. &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://groups.google.com/forum/#!topic/android-security-updates/iv1BF0f0XY4&quot;&gt;Nexus Security Bulletin—October 2015&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.androidpolice.com/2015/09/30/the-nexus-5x-and-6p-have-software-accelerated-encryption-but-the-nexus-team-says-its-better-than-hardware-encryption/&quot;&gt;The Nexus 5X And 6P Have Software-Accelerated Encryption, But The Nexus Team Says It's Better Than Hardware Encryption&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.gdssecurity.com/labs/2015/10/13/reverse-shell-over-sms-exploiting-cve-2015-5897.html&quot;&gt;Reverse Shell Over SMS (Exploiting CVE-2015-5897)&lt;/a&gt; (OS X)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.reddit.com/r/Android/comments/3phaw6/nexus_6p_has_a_hardware_fuse_that_blows/cw6w6gk&quot;&gt;Nexus 6P has a hardware fuse that blows irreversibly when bootloader unlocked.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.imperialviolet.org/2015/10/17/boringssl.html&quot;&gt;BoringSSL runs Android M and other stuff...&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://researchcenter.paloaltonetworks.com/2015/10/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/&quot;&gt;YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs&lt;/a&gt; (not actually the FIRST)&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update October 2015</title>
 <pubDate>Sun, 04 Oct 2015 21:38:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2015/10/04#mobile_security_news_update_oct2015</link>
 <description>
Conferences
&lt;ul&gt;
&lt;A href=&quot;https://www.blackhat.com/eu-15/briefings.html&quot;&gt;Black Hat Europe&lt;/a&gt; November, Amsterdam NL. ALL YOUR ROOT CHECKS BELONG TO US: THE SAD STATE OF ROOT DETECTION by Azzedine Benameur  &amp;  Nathan Evans  &amp; Yun Shen.
ANDROBUGS FRAMEWORK: AN ANDROID APPLICATION SECURITY VULNERABILITY SCANNER by Yu-Cheng Lin. 
AUTHENTICATOR LEAKAGE THROUGH BACKUP CHANNELS ON ANDROID by Guangdong Bai. 
FAUX DISK ENCRYPTION: REALITIES OF SECURE STORAGE ON MOBILE DEVICES by Daniel Mayer  &amp; 	Drew Suarez.
FUZZING ANDROID: A RECIPE FOR UNCOVERING VULNERABILITIES INSIDE SYSTEM COMPONENTS IN ANDROID by Alexandru Blanda.
LTE &amp; IMSI CATCHER MYTHS by Ravishankar Borgaonkar  &amp;  Altaf Shaik  &amp; 	N. Asokan  &amp;  Valtteri Niemi  &amp; 	Jean-Pierre Seifert.
TRIAGING CRASHES WITH BACKWARD TAINT ANALYSIS FOR ARM ARCHITECTURE by Dongwoo Kim  &amp; 	Sangwho Kim.
&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;http://secretcon.com/&quot;&gt;Secret Conference&lt;/a&gt; October 9th, NYC. Talks by Jon Callas and Dan Ford from Silent Circle / Blackphone.
&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://ruxcon.org.au/speakers/&quot;&gt;Ruxcon&lt;/a&gt; October 24-25 Melbourne, Aus. TEAM PANGU on
DESIGN, IMPLEMENTATION AND BYPASS OF THE CHAIN-OF-TRUST MODEL OF IOS. MARK DOWD on
MALWAIRDROP: COMPROMISING IDEVICES VIA AIRDROP.
JOSHUA KERNELSMITH SMITH on HIGH-DEF FUZZING: EXPLORING VULNERABILITIES IN HDMI-CEC.
BABIL GOLAM SARWAR on
HACK NFC ACCESS CARDS &amp; STEAL CREDIT CARD DATA WITH ANDROID FOR FUN &amp;PROFIT.
COLBY MOORE on
SPREAD SPECTRUM SATCOM HACKING: ATTACKING THE GLOBALSTAR SDS.
&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;http://sandiego.toorcon.net/conference/&quot;&gt;ToorCon San Diego&lt;/a&gt; October 24-25, San Diego, CA. 
The Phr3$h Pr1nc3 0f Bellk0r3 on Fuzzing GSM for fun and profit.
&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.syscan360.org/en/schedule/&quot;&gt;SyScan360i&lt;/a&gt; October 21-22 Beijing China.
Fuzzing Android System Service by Binder Call to Escalate Privilege by Guang Gong.
&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://pacsec.jp/speakers.html&quot;&gt;PacSec&lt;/a&gt; November, Tokyo JP. 
BlueToot / BlueProx - when Bluetooth met NFC by Adam Laurie.
&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://2015.zeronights.org/agenda.html&quot;&gt;ZeroNights&lt;/a&gt; 25-26 November, Russia. 
Extracting the painful (Blue)tooth by Matteo Beccaro and Matteo Collura.
&lt;/ul&gt;

&lt;br&gt;
&lt;br&gt;
HP / ZDI will not run Mobile Pwn2Own at PacSec (in Japan) due to export restrictions.
Source &lt;A href=&quot;https://twitter.com/dragosr/status/638504136250560512&quot;&gt;Dragos Ruiu&lt;/a&gt;.
This is unfortunate. &lt;br&gt;&lt;Br&gt;

Personal note: Since September I'm working for &lt;a href=&quot;http://www.squareup.com&quot;&gt;Square&lt;/a&gt; doing mobile security engineering. This blog will only be temporarily affected by the job switch as I get settled I will return to more then one post per month.
&lt;br&gt;&lt;br&gt;

Links
&lt;ul&gt;
&lt;A href=&quot;http://www.androidpolice.com/2015/10/02/wtf-motorola-marketed-the-moto-e-2015-on-promise-of-updates-is-now-apparently-ending-them-after-219-days/&quot;&gt;Motorola Marketed The Moto E 2015 On Promise Of Updates, Is Now Apparently Ending Them After 219 Days&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://randomoracle.wordpress.com/2015/09/29/android-pay-proxy-no-more/&quot;&gt;ANDROID PAY: PROXY NO MORE&lt;/a&gt; Super interesting post on the insides of Android Pay and Google Wallet&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://bgr.com/2015/09/24/ios-9-in-app-purchases-hack/&quot;&gt;iOS 9 code vulnerability lets hackers steal thousands of dollars worth of in-app purchases&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/XcodeGhostSource/XcodeGhost&quot;&gt;XcodeGhost Source&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://github.com/alibaba/AndFix&quot;&gt;AndFix is a library that offer hot-fix for Android App.&lt;/a&gt; some parts looks very very similar to PatchDroid. I have to look closer at this.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.nowsecure.com/blog/2015/09/14/announcing-android-vulnerability-test-suite/&quot;&gt;Announcing Android Vulnerability Test Suite&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://github.com/fi01/CVE-2015-3636&quot;&gt;PoC code for 32 bit Android OS - ping pong root&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://sites.utexas.edu/iso/2015/09/15/android-5-lockscreen-bypass/&quot;&gt;Android 5.x Lockscreen Bypass (CVE-2015-3860)&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;http://rotlogix.com/2015/09/13/defeating-ssl-pinning-in-coin-for-android/&quot;&gt;Defeating SSL Pinning in Coin's Android Application&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://drive.google.com/file/d/0B1vYN8cImxr9TWEwX0FfUVctMnM/view&quot;&gt;Assessing Android Applications Using Command-Line Fu (slides)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://blog.zimperium.com/the-latest-on-stagefright-cve-2015-1538-exploit-is-now-available-for-testing-purposes/&quot;&gt;The Latest on Stagefright: CVE-2015-1538 Exploit is Now Available for Testing Purposes&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;http://theroot.ninja/&quot;&gt;SunShine - The #1 Bootloader Unlock tool For Your HTC or Motorola Smartphone!&lt;/a&gt; not new but not too many people know about this&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/zyq8709/DexHunter&quot;&gt;DexHunter&lt;/a&gt; General Automatic Unpacking Tool for Android Dex Files&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/scottyab/safetynethelper&quot;&gt;SafetyNet Helper wraps the Google Play Services SafetyNet.API and verifies Safety Net API response with the Android Device Verification API.&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://koz.io/inside-safetynet/&quot;&gt;SafetyNet: Google's tamper detection&lt;/a&gt; interesting insights in the on-device parts of SafetyNet.&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://blog.zimperium.com/zimperium-zlabs-is-raising-the-volume-new-vulnerability-processing-mp3mp4-media/&quot;&gt;Zimperium zLabs is Raising the Volume: New Vulnerability Processing MP3/MP4 Media.&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://bitbucket.org/JesusFreke/smali/downloads&quot;&gt;baksmali 2.1&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.androidpolice.com/2015/09/30/the-nexus-5x-and-6p-have-software-accelerated-encryption-but-the-nexus-team-says-its-better-than-hardware-encryption/&quot;&gt;The Nexus 5X And 6P Have Software-Accelerated Encryption, But The Nexus Team Says It's Better Than Hardware Encryption&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://www.androidpolice.com/2015/09/29/android-now-shows-your-devices-android-security-patch-level-in-marshmallow/&quot;&gt;Android Now Shows Your Device's &quot;Android Security Patch Level&quot; In Marshmallow&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://census-labs.com/news/2015/09/24/efficient-android-fuzzing/&quot;&gt;The road to efficient Android fuzzing&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://github.com/CvvT/dumpDex&quot;&gt;An IDA Pro based Dex Dumper plugin &lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;http://blog.quarkslab.com/kernel-vulnerabilities-in-the-samsung-s4.html&quot;&gt;Kernel Vulnerabilities in the Samsung S4&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;http://msc.pediy.com/&quot;&gt;Mobile Security Challenge Organized by Alibaba &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.nowsecure.com/blog/2015/09/16/ruminations-on-app-cves/&quot;&gt;Ruminations on App CVEs&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://achaykin.blogspot.in/2015/08/spoofing-and-intercepting-sim-commands.html&quot;&gt;Spoofing and intercepting SIM commands through STK framework (Android 5.1 and below) (CVE-2015-3843)&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://plus.google.com/+JustinCaseAndroid/posts/iv1oFBujQyH&quot;&gt;DexHook&lt;/a&gt; is a small xposed module for hooking BaseDexClassLoader and capturing dynamically loaded jars/dex files without interfering with the normal run of the application.&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://www.androidpolice.com/2015/09/07/android-m-begins-locking-down-floating-apps-requires-users-to-grant-special-permission-to-draw-on-other-apps/&quot;&gt;Android M Begins Locking Down Floating Apps, Requires Users To Grant Special Permission To Draw On Other Apps&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://www.wired.com/2015/09/hack-brief-upgrade-ios-9-now-avoid-bluetooth-iphone-attack/&quot;&gt;Hack Brief: Upgrade to iOS 9 to Avoid a Bluetooth iPhone Attack&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://usmile.at/symposium/program&quot;&gt;Android Security Symposium - all slides online&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://www.irongeek.com/i.php?page=videos/derbycon5/the-3-way11-unbillable-exploiting-android-in-app-purchases-alfredo-ramirez&quot;&gt;Unbillable: Exploiting Android In App Purchases by Alfredo Ramirez at Derbycon 2015&lt;/a&gt; I haven't watched this yet.
&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://www.irongeek.com/i.php?page=videos/derbycon5/teach-me21-the-problems-with-jni-obfuscation-in-the-android-operating-system-rick-ramgattie&quot;&gt;The problems with JNI obfuscation in the Android Operating System by Rick Ramgattie at Derbycon 2015&lt;/a&gt; Haven't watched this yet. &lt;br&gt;&lt;Br&gt;
&lt;/ul&gt;
</description>
 </item>
  <item>
 <title>Mobile Security News Update September 2015</title>
 <pubDate>Tue, 01 Sep 2015 16:46:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2015/09/01#mobile_security_news_update_sep2015</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://www.blackhat.com/eu-15/briefings.html&quot;&gt;Black Hat Europe&lt;/a&gt; Nov 12-13 Amsterdam. (IN-)SECURITY OF BACKEND-AS-A-SERVICE by Siegfried Rasthofer  &amp; Steven Arzt. ALL YOUR ROOT CHECKS BELONG TO US: THE SAD STATE OF ROOT DETECTION by Azzedine Benameur  &amp;  Nathan Evans  &amp; Yun Shen. AUTHENTICATOR LEAKAGE THROUGH BACKUP CHANNELS ON ANDROID by Guangdong Bai. LTE &amp; IMSI CATCHER MYTHS by Ravishankar Borgaonkar  &amp;  Altaf Shaik. 
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://ruxcon.org.au/speakers/&quot;&gt;Ruxcon&lt;/a&gt; Oct 25. Melbourne Australia. HIGH-DEF FUZZING: EXPLORING VULNERABILITIES IN HDMI-CEC by JOSHUA 'KERNELSMITH' SMITH. DESIGN, IMPLEMENTATION AND BYPASS OF THE CHAIN-OF-TRUST MODEL OF IOS by Team Pangu.
&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://www.hackerhalted.com/2015/agenda/&quot;&gt;Hacker Halted&lt;/a&gt; September 17th, Atlanta GA. One SMS to hack a company by Dmitry Chastuhin. Why You'll Care More About Mobile Security in 2020 by Tom Bain. 
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.virusbtn.com/conference/vb2015/programme/index.xml&quot;&gt;Virus Bulletin&lt;/a&gt; September 29th, Prague. Mobile banking fraud via SMS in North America: who's doing it and how by Cathal Mc Daid. Will Android trojan, worm or rootkit survive in SEAndroid and containerization? by William Lee and Rowland Yu. Dare 'DEVIL': beyond your senses with Dex Visualizer by 
Jun Yong Park and Seolwoo Joo. Android ransomware: turning CryptoLocker into CryptoUnlocker (live demo) by Alexander Adamov.
&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;
CFPs
&lt;ul&gt;
&lt;a href=&quot;http://sandiego.toorcon.net/&quot;&gt;toorcon&lt;/a&gt; San Diego&lt;/a&gt;&lt;br&gt;
&lt;br&gt;
&lt;/ul&gt;
Unfortunately I had to cancel my talk at &lt;A href=&quot;https://usmile.at/symposium/program&quot;&gt;Android Security Symposium&lt;/a&gt; in
Vienna due to a scheduling conflict. It is a real bummer but I can't do anything about it. The replacement talk is
done by my friend and research buddy &lt;A href=&quot;https://usmile.at/symposium/speakers#matthias_neugschwandtner&quot;&gt;Matthias&lt;/a&gt; 
he is doing a talk on one of our previous mitigation projects.&lt;br&gt;
&lt;br&gt;
The iOS &lt;A href=&quot;http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/&quot;&gt;KeyRaider&lt;/a&gt; malware looks rather interesting. It combines a lot of different functionality. Such as 
steeling AppStore credentials and a ransomware module. &lt;b&gt;This malware again only targets jailbroken iOS devices, users specifically had to download apps from third-party Cydia repositories. &lt;/b&gt; So this is not a general threat but a threat to people who jailbreak their device. If you jailbreak you likely have a very specific need and you hopefully know what you are doing. If not, just don't jailbreak your device (no matter what OS is runs).
&lt;br&gt;&lt;Br&gt;

I just found this recently published paper titled: &lt;a href=&quot;http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/hotmiddlebox/p25.pdf&quot;&gt;Header Enrichment or ISP Enrichment? Emerging Privacy Threats in Mobile Networks&lt;/a&gt;. The paper studies HTTP header
modifications and injection that is done by mobile network operators. The paper more or less is a direct follow up to my 
paper on the same subject titled: &lt;A href=&quot;https://www.mulliner.org/collin/publications/mobile_web_privacy_icin10_mulliner.pdf&quot;&gt;Privacy Leaks in Mobile Phone Internet Access&lt;/a&gt;. Their paper looks at what happens to smart phones  that actually use HTTP (my work was mostly focused on phones that used the WAP technology - even though WAP was translated to HTTP to access regular web pages). Anyway their paper provides a good insight in what is happening. If you run a website that get a lot of mobile traffic you should look if you see some of the HTTP headers that are injected by the mobile carriers.
&lt;br&gt;&lt;br&gt;
Links
&lt;ul&gt;
&lt;a href=&quot;https://github.com/linkedin/qark/&quot;&gt;QARK - Quick Android Review Kit&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/secmob/PoCForCVE-2015-1528&quot;&gt;PoCForCVE-2015-1528&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://xref.opersys.com/&quot;&gt;Android Cross-Reference covers every single Android release (all 133) ever made&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://bits-please.blogspot.com/2015/08/android-linux-kernel-privilege_26.html&quot;&gt;Android linux kernel privilege escalation (CVE-2014-4323) &lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;http://bits-please.blogspot.cz/2015/08/effectively-bypassing-kptrrestrict-on.html?spref=tw&quot;&gt;Effectively bypassing kptr_restrict on Android &lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://github.com/rednaga/training/blob/master/DEFCON23/O%26D%20-%20Android%20Reverse%20Engineering.pdf&quot;&gt;Offensive and Defensive Android Reverse Engineering by Tim, Jon, and Caleb&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://rotlogix.com/2015/08/22/remote-code-execution-in-dolphin-browser-for-android/&quot;&gt;Remote Code Execution in Dolphin Browser for Android&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://changes.droidsec.org/2015/08/21/android-m-preview-2.html&quot;&gt;Changes made to AOSP from m-preview-1 to m-preview-2&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://twitter.com/timstrazz/status/638401889973891072&quot;&gt;Tim Strazzere: So I'm guessing @YotaPhone never expected to send updates? Since the OTA keys are the compromised, test-keys&lt;/a&gt; (good find, but WTF?)&lt;br&gt;&lt;Br&gt; 
&lt;a href=&quot;http://newsroom.t-mobile.com/issues-insights-blog/stopping-network-abusers.htm&quot;&gt;Very interesting blog post from the T-Mobile USA CEO. He basically says their are going after people who modify their phones to get free tethering.&lt;/a&gt; The outcome will be interesting.&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.nowsecure.com/blog/2015/08/10/world-writable-code-is-bad-mmmmkay/&quot;&gt;World Writable Code Is Bad, MMMMKAY&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://www.reddit.com/r/Android/comments/3hhciw/ask_us_almost_anything_about_android_security/&quot;&gt;Ask Us Almost Anything about Android Security, Privacy or Malware with beaups, Tim &quot;diff&quot; Strazzere, Joshua &quot;jduck&quot; Drake, and Jon &quot;jcase&quot; Sawyer&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://androidcommunity.com/google-devs-add-runtime-permissions-in-time-for-android-6-0-marshmallow-20150828/&quot;&gt;Android 6.0 with Runtime Permissions&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://github.com/android-rooting-tools/android_run_root_shell&quot;&gt;android_run_root_shell&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://www.youtube.com/watch?v=71YP65UANP0&amp;list=PLH15HpR5qRsXF78lrpWP2JKpPJs_AFnD7&amp;index=3&quot;&gt;Video of jduck's Black Hat talk: Stagefright: Scary Code in the Heart of Android&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;/ul&gt;
&lt;br&gt;
A rather short updates this time. Until next time! </description>
 </item>
  <item>
 <title>Mobile Security News Update August 2015</title>
 <pubDate>Tue, 18 Aug 2015 18:16:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2015/08/18#mobile_security_news_update_aug2015</link>
 <description>
Finally I have time to write a new blog post again.
The last couple of weeks have been super busy for me.
I had to finish a project, prepare a talk about it, and give a bunch of talks at various places in July and August.
&lt;br&gt;&lt;br&gt;
Conferences
&lt;ul&gt;
&lt;a href=&quot;http://t2.fi/schedule/2015/&quot;&gt;T2&lt;/a&gt; Helsinki, Finland. LTE (in) Security Ravishankar Borgaonkar &amp; Altaf Shaik. &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://2k15.balccon.org&quot;&gt;BalcCon&lt;/a&gt; Novi Sad, Vojvodina, Serbia.  Private communications with mobile phones in the post-Snowden world, the _open_source_ way by Bojan Smiljanic.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://2015.appsecusa.org/agenda/speakers/&quot;&gt;APPSEC USA&lt;/a&gt; San Francisco, CA. QARK: Android App Exploit and SCA Tool by Tushar Dalvi and Tony Trummer. SecureMe - Droid' Android Security Application by Vishal Asthana and Abhineet Jayaraj. OWASP Reverse Engineering and Code Modification Prevention Project (Mobile) by Jonathan Carter. ShadowOS: Modifying the Android OS for Mobile Application Testing by Ray Kelly.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://grrcon.com/presentations/&quot;&gt;GrrCon&lt;/a&gt; Grand Rapids, MI. Phones and Privacy for Consumers by Matthew and David&lt;br&gt;
&lt;/ul&gt;
&lt;Br&gt;
&lt;br&gt;
&lt;b&gt;Smartwatches&lt;/b&gt;
&lt;ul&gt;
I recently bought an &lt;A href=&quot;http://www.apple.com/watch/&quot;&gt;Apple Watch&lt;/a&gt;. 
The primary reason was &lt;i&gt;fun&lt;/i&gt;. Also since I switched to Two-Factor Authentication (2FA) for all my private
infrastructure and all my web accounts that support it I though it would make life easier. I use &lt;a href=&quot;http://www.duosecurity.com&quot;&gt;Duo&lt;/a&gt; 2FA for my own stuff and they have a Watch app which is pretty convenient. 
Before I owned the first &lt;A href=&quot;https://getpebble.com/shop/pebble&quot;&gt;pebble&lt;/a&gt; watch. I liked that a lot
even tho I had a lot of issues with the Bluetooth connection between the pebble and my Nexus 5. Sometimes it worked great and sometimes it just didn't work at all.
I also got a &lt;a href=&quot;http://www.lg.com/us/smart-watches/lg-W110-g-watch-r&quot;&gt;LG G Watch R (W110)&lt;/a&gt; (Android Wear) but I didn't really use it.
It was much too big for my wrist. Also the round display was kinda strange. Some of the apps seem to not be designed for it and cut off parts of the 
information that should be displayed.
I also found the interface to be confusing, but this might be due to my very very short trial run of the watch.
Between the pebble and the LG Watch I also had a &lt;a href=&quot;https://toq.qualcomm.com/&quot;&gt;Toq&lt;/a&gt; but the Toq had many issues besides its size so I never really 
used it. I tried to wear it like once.
&lt;br&gt;&lt;br&gt;
Anyway the only reason I write about smartwatches is because I really like the Duo 2FA watch app. This makes 2FA much much easier and user friendly.
I known I'm not the first to write about smartwatches or wearables in the security context but the user friendliness could really make a difference.
Also a watch is harder to loose then a token (if you still use one of those).
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;

&lt;b&gt;Stagefright&lt;/b&gt;
&lt;ul&gt;
I guess I don't have to say much about the &lt;a href=&quot;https://blog.zimperium.com/experts-found-a-unicorn-in-the-heart-of-android/&quot;&gt;Stagefright&lt;/a&gt; series of Android security vulnerabilities. The vulnerabilities are present in Android's media format handling library (named stagefright). Several factors make
this bugs interesting. First, every Android version after 2.2 was vulnerable (at the time of discovery) that was around 95% of all devices.
Second, the bug can be remotely triggered via MMS. Yes MMS once again provides the ultimate attack vector against smartphones. &lt;a href=&quot;https://www.mulliner.org/pocketpc/CollinMulliner_defcon14_pocketpcphones.pdf&quot;&gt;Who would have known?&lt;/a&gt; ;-)
&lt;br&gt;&lt;Br&gt;
The bug was patched relatively fast by Google since Joshua provided patches. Google started shipping OTA updates for their Nexus devices relatively fast.
Still most Android devices will not get patched or will receive their patches super late (and thus users will not be protected in a timely fashion). The
reason for this is mostly the mobile ecosystem which is largely not suited for fast patch deployment. I provided some comments about this issue
on &lt;A href=&quot;http://www.npr.org/sections/alltechconsidered/2015/07/27/426613020/major-flaw-in-android-phones-would-let-hackers-in-with-just-a-text&quot;&gt;NPR&lt;/a&gt; in late July.
&lt;br&gt;&lt;Br&gt;
While patches/updates were rolled out Jordan from Exodus found that the patches are not &lt;i&gt;complete&lt;/i&gt; and contain more vulnerabilities
in the exact code that was &lt;i&gt;fixed&lt;/i&gt; in the update. His blog post describing the issue is &lt;a href=&quot;https://blog.exodusintel.com/2015/08/13/stagefright-mission-accomplished/&quot;&gt;here&lt;/a&gt;.&lt;br&gt;&lt;Br&gt;

The only way to protect yourself is to update your device to firmware version that does not contain the vulnerability.
If you are one of the many people who own phones that did not yet receive an update your only chance is to disable MMS auto-download.
This will not kill the bug since you can still be attacked using other vectors (e.g. download and play a .mp4 file) but disabling
MMS auto-download will at at least remove the automatic remote exploitation problem. A step by step way to disable MMS auto-download
for various MMS clients is provided by Lookout &lt;a href=&quot;https://blog.lookout.com/blog/2015/07/30/how-to-disable-auto-fetching-of-mms-messages-on-a-devices-default-sms-app/&quot;&gt;here&lt;/a&gt;.
&lt;br&gt;&lt;Br&gt;

Stagefright links:&lt;br&gt;&lt;Br&gt;
&lt;ul&gt;
Demo video is: &lt;a href=&quot;https://www.youtube.com/watch?t=86&amp;v=PxQc5gOHnKs&quot;&gt;here&lt;/a&gt;.&lt;br&gt;&lt;Br&gt;
Joshua's Black Hat slides are: &lt;a href=&quot;https://s3.amazonaws.com/zhafiles/Zimperium-Handset-Alliance/Joshua+Drake+-+Stagefright+Scary+Code+in+the+Heart+of+Android-slides.pdf&quot;&gt;here&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
Android detector app is: &lt;a href=&quot;https://play.google.com/store/apps/details?id=com.zimperium.stagefrightdetector&amp;hl=en&quot;&gt;here&lt;/A&gt;&lt;br&gt;&lt;br&gt;
There is even a &lt;a href=&quot;https://en.wikipedia.org/wiki/Stagefright_(bug)&quot;&gt;wikipedia page for Stagefright_(bug)&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;br&gt;
&lt;A href=&quot;http://blog.fortinet.com/post/stagefright-telegram-stage-left-whatsapp-stage-right&quot;&gt;StageFright, Telegram Stage-Left &amp; WhatsApp Stage-Right &lt;/a&gt;
&lt;/ul&gt;
&lt;/ul&gt;

Links
&lt;ul&gt;
&lt;a href=&quot;http://newosxbook.com/tools/disarm.html&quot;&gt;disarm - Quick &amp; (very) dirty command line instruction lookup for ARM64 &lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://gist.github.com/AKosterin/22eb823a16c3925bb082&quot;&gt;JEB Plugin for decrypt DexGuard encrypted Strings.  &lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://bits-please.blogspot.de/2015/08/android-linux-kernel-privilege.html&quot;&gt;Android linux kernel privilege escalation vulnerability and exploit (CVE-2014-4322) &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/laginimaineb/fuzz_zone&quot;&gt;Fuzzing utility which enables sending arbitrary SCMs to TrustZone &lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://github.com/laginimaineb/MSM8974_exploit&quot;&gt;Full TrustZone exploit for MSM8974&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://github.com/guidepointsecurity/lobotomy&quot;&gt;Android Security Toolkit&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://groups.google.com/forum/#!topic/android-security-updates/Ugvu3fi6RQM&quot;&gt;First public Android Security Bulletin&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://blog.fortinet.com/post/locker-an-android-ransomware-full-of-surprises&quot;&gt;Locker: an Android ransomware full of surprises &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://illmatics.com/Remote%20Car%20Hacking.pdf&quot;&gt;Remote Exploitation of an Unaltered Passenger Vehicle&lt;/a&gt; (white paper) I link this because the cars were sitting on cellular networks with OPEN ports that allowed to issue &lt;A href=&quot;http://www.freedesktop.org/wiki/Software/dbus/&quot;&gt;D-Bus&lt;/a&gt; commands to activate the wipers or change volume on the radio. CRAZINESS&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://bits-please.blogspot.fr/2015/08/exploring-qualcomms-trustzone.html&quot;&gt;Exploring Qualcomm's TrustZone implementation &lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://plus.google.com/+JustinCaseAndroid/posts/4B2Cz1K4kAj&quot;&gt;HTC &quot;zerodays&quot; from our Defcon workshop&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://plus.google.com/+JustinCaseAndroid/posts/LofRwH6VoQp&quot;&gt;Qualcomm LPE vuln from our #defcon workshop &lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://www.blackhat.com/us-15/briefings.html&quot;&gt;Black Hat slides are online now&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://www.dfrws.org/2015/proceedings/DFRWS2015-8.pdf&quot;&gt;New acquisition method based on firmware update protocols for Android smartphones&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/backes&quot;&gt;Boxify: Full-fledged App Sandboxing for Stock Android&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://www.droidsec.org/wiki/#android-market-downloaders&quot;&gt;Android Market Downloaders &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.usenix.org/system/files/conference/woot15/woot15-paper-peles.pdf&quot;&gt;ONE CLASS TO RULE THEM ALL 0-DAY DESERIALIZATION VULNERABILITIES IN ANDROID&lt;/a&gt; (paper)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/lovelydream/Universal-Android-Rooting-Is-Back/blob/master/slides/BHUSA-15-Wen-Xu.pdf&quot;&gt;Universal Android rooting&lt;/a&gt; (slides Black Hat USA 2015)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://speakerdeck.com/dmayer/faux-disk-encryption-realities-of-secure-storage-on-mobile-devices&quot;&gt;Faux Disk Encryption - Realities of Secure Storage on Mobile Devices&lt;/a&gt; slides (Black Hat 2015)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://koodous.com/&quot;&gt;Koodous&lt;/a&gt; collaborative platform for Android malware analysts&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.digital-forensics.it/2015/07/windows-phone-pin-cracking.html&quot;&gt;Windows Phone PIN cracking &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://copperhead.co/2015/07/27/hardening-bionic&quot;&gt;Hardening Android's Bionic libc&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;A href=&quot;http://www.evilsocket.net/2015/07/27/how-to-use-old-gsm-protocolsencodings-know-if-a-user-is-online-on-the-gsm-network-aka-pingsms-2-0/&quot;&gt;How to use old GSM protocols/encodings to know if a user is Online on the GSM Network AKA PingSMS 2.0&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://newandroidbook.com/tools/imgtool.html#V03&quot;&gt;imgtool&lt;/a&gt; quick tool to unpack Android images&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.nowsecure.com/blog/2015/07/16/android-m-a-security-research-perspective-part-1/&quot;&gt;Android M: A Security Research Perspective (Part 1) &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://play.google.com/store/apps/details?id=cz.eutopia.snooperstopper&quot;&gt;SnooperStopper: Automatically prompts you to change FDE password if lockscreen PIN/password is changed (needs root)&lt;/a&gt; Android App&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://t.co/rHsIM8WaDR&quot;&gt;HackingTeam's Android Exploit  &lt; nice review by Tencent Sec Response Center. &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain&quot;&gt;PGP on Android using GPG applet on Yubikey, via NFC. Useful to PGP while mobile without storing priv key on dev. &lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/trend-micro-discovers-android-vulnerability-that-can-lead-to-exposure-of-device-memory-content/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29&quot;&gt; Android Vulnerability that Can Lead to Exposure of Device Memory Content&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://github.com/alibaba/dexposed&quot;&gt;dexposed&lt;/a&gt; enable 'god' mode for single android application (fork of exposed)&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://forum.xda-developers.com/showthread.php?t=3034811&amp;p=61594046&quot;&gt;Xposed for lollipop (5.0) now allows hooking native methods, also arm64 and x86 &lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://github.com/mingyuan-xia/PATDroid&quot;&gt;A Program Analysis Toolkit for Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://www.androidpolice.com/android_aosp_changelogs/android-5.1.1_r4-to-android-5.1.1_r5-AOSP-changelog.html&quot;&gt;Could it be true that Android 5.1.1_r5 enables both dm-verity *and* HW accelerated FDE? Great success if so.&lt;/a&gt;&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://nelenkov.blogspot.de/2015/06/password-storage-in-android-m.html&quot;&gt;Password storage in Android M&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://events.ccc.de/camp/2015/Fahrplan/system/attachments/2649/original/CCCamp-SRLabs-Advanced_Interconnect_Attacks.v1.pdf&quot;&gt;lecture: Advanced interconnect attacks Chasing GRX and SS7 vulns&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Hacking Team took a bunch of my Stuff :-(</title>
 <pubDate>Tue, 21 Jul 2015 19:28:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2015/07/21#hackingteam</link>
 <description>
Everybody heard that Hacking Team got hacked
&lt;a href=&quot;http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html&quot;&gt;1&lt;/a&gt;, 
&lt;a href=&quot;http://www.wired.com/2015/07/hacking-team-breach-shows-global-spying-firm-run-amok/&quot;&gt;2&lt;/a&gt;,
&lt;a href=&quot;http://www.theguardian.com/technology/2015/jul/06/hacking-team-hacked-firm-sold-spying-tools-to-repressive-regimes-documents-claim&quot;&gt;3&lt;/a&gt;,
&lt;a href=&quot;https://www.schneier.com/blog/archives/2015/07/hacking_team_is.html&quot;&gt;4&lt;/a&gt;
While I think this is pretty great since they are kinda known to be scumbags since they
sell to repressive governments I found out about not so great things around this hack.
Actually I didn't find out myself put was pointed to it by other people on Twitter 
(&lt;A href=&quot;https://twitter.com/aurelsec/status/618116873406803968&quot;&gt;1&lt;/a&gt;)
, via email, and personal (thanks Michael Weissbacher!).
&lt;br&gt;&lt;br&gt;
&lt;b&gt;Basically I was told that Hacking Team used a bunch of my Android tools to build their monitoring
software for Android.&lt;/b&gt;
&lt;br&gt;&lt;br&gt;
What got me really upset is this email:
&lt;ul&gt;
&lt;code&gt;
I was analysing recent leak of hacking team from italy, and saw you supply the core android audiocapture for hijack voice calls on android. Have you updated it to new devices like lollypop?
&lt;/code&gt;
&lt;/ul&gt;
This person thinks that I wrote the Android voice call interception for Hacking Team. 
&lt;b&gt;This is obviously not the case!&lt;/b&gt; Hacking Team took my ADBI framework and tools to build their
software around it. The software this specific email is talking about is &lt;a href=&quot;https://github.com/hackedteam/core-android-audiocapture&quot;&gt;hackedteam/core-android-audiocapture&lt;/A&gt; (the link goes to the hackedteam GitHub repository). You can see that they kept even the original filenames (e.g. libt.c) that was
part of my &lt;a href=&quot;https://www.mulliner.org/android/feed/collin_android_dbi_v02.zip&quot;&gt;original ADBI release&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;/images/hackedteam_1.png&quot;&gt;&lt;img src=&quot;/images/hackedteam_1.png&quot; alt=&quot;click for large image&quot; align=&quot;center&quot; width=&quot;70%&quot;&gt;&lt;/a&gt;&lt;br&gt;
The reason why someone might think I wrote those tools for Hacking Team are pretty obvious once you take
a look at the leaked code. Take, for example, the &lt;a href=&quot;https://github.com/hackedteam/core-android-audiocapture/blob/master/dbi_release/libt.c&quot;&gt;libt.c&lt;/a&gt; file from the HackedTeam repository. Hacking Team left all the copyright information (my name, website, and email address) in those files.
&lt;br&gt;&lt;br&gt;
In addition to my ADBI framework Hacking Team also used my SMS fuzzer injector that I wrote in 2009
while working on the SMS fuzzing project together with Charlie Miller. Their &lt;a href=&quot;https://github.com/hackedteam/fuzzer-android/&quot;&gt;Android fuzzer&lt;/a&gt; also made use of my ADBI framework. 
&lt;br&gt;&lt;br&gt;
&lt;b&gt;Conclusions:&lt;/b&gt;
&lt;ul&gt;
I'm pretty angry and sad to see my open source tools being used by Hacking Team to make products
to spy on activists. Even worse is the fact that due to the lazy way they managed their source
repository less informed people might get the idea that I developed parts of their tools for them.
Just to make this very clear: &lt;b&gt;I did not write any of those tools for Hacking Team.&lt;/b&gt;
&lt;br&gt;&lt;br&gt;
For the future I will use a license for all my software that excludes use for this kind of purpose.
I have no clue yet how this license would look like so if anybody has a hint about pre existing open source licenses that exclude this kind of usage please drop me an email.
&lt;br&gt;&lt;br&gt;
Obviously Hacking Team also used other open source software such as Cuckoo Sandbox. I hope everybody
is going to think about future license to &lt;i&gt;prevent&lt;/i&gt; this kind of usage.
I'm not a lawyer but I would be interested in what legal action one could take if their software
license excluded the use case of Hacking Team.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
Below some links to the Hackedteam GitHub repository and the link to my ADBI repository. You can clearly
see that it is based on my software.
&lt;br&gt;&lt;br&gt;
Links:
&lt;ul&gt;
&lt;a href=&quot;https://github.com/crmulliner/adbi&quot;&gt;github.com/crmulliner/adbi&lt;/A&gt; My GitHub repository for ADBI&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/hackedteam/core-android-audiocapture&quot;&gt;hackedteam/core-android-audiocapture&lt;/a&gt; (based on my ADBI framework)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/hackedteam/fuzzer-android/tree/master/sms_fuzzer_injectors/Lg&quot;&gt;hackedteam/fuzzer-android/tree/master/sms_fuzzer_injectors/Lg&lt;/a&gt; (based on my SMS fuzzer injector I wrote in 2009)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/hackedteam?tab=repositories&quot;&gt;github.com/hackedteam&lt;/A&gt; all repositories&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;
Comments welcome via email to: collin AT mulliner.org
&lt;br&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update June 2015 (part 2)</title>
 <pubDate>Tue, 23 Jun 2015 20:47:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2015/06/23#mobile_security_news_update_june2015_2</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://defcon.org/html/defcon-23/dc-23-speakers.html&quot;&gt;Defcon&lt;/a&gt; QARK: Android App Exploit and SCA Tool
Tony Trummer and Tushar Dalvi  (this is the only talk that was added after my last post)
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://ruxconbreakpoint.com/&quot;&gt;Breakpoint&lt;/a&gt; 22-23 October, Melbourne, Australia. TEAM PANGU:
DESIGN, IMPLEMENTATION AND BYPASS OF THE CHAIN-OF-TRUST MODEL OF IOS; JORDI VAN DEN BREEKEL:
RELAYING EMV CONTACTLESS TRANSACTIONS WITH OFF-THE-SHELF ANDROID DEVICES; DMITRY KURBATOV: ATTACKS ON TELECOM OPERATORS AND MOBILE SUBSCRIBERS USING SS7. 
&lt;/ul&gt;
All other conferences still have their CFPs open and didn't post any talks yet. The BreakPoint schedule is also not final yet.
&lt;br&gt;&lt;br&gt;
I wanted to point to something that apparently not many people know about: &lt;a href=&quot;https://sektioneins.de/en/blog/14-10-23-pangu-installs-unlicensed-code.html&quot;&gt;Pangu jailbreak installs unlicensed code on millions of devices&lt;/a&gt;. Pangu has their &lt;a href=&quot;http://blog.pangu.io/jailbreak-should-not-tolerate-regional-discrimination/&quot;&gt;own statement&lt;/a&gt; about this.
The Wikipedia page about &lt;a href=&quot;https://en.wikipedia.org/wiki/Pangu_Team&quot;&gt;Pangu Team&lt;/a&gt; states that &lt;i&gt;they didn't have to sign an NDA for the training and therefore can use the vulnerability&lt;/i&gt;. Stefan's point is not about the vulnerability but about &lt;a href=&quot;https://twitter.com/i0n1c/status/613111564107939842&quot;&gt;his code&lt;/a&gt;. All in all I can't verify all claims but I would say I know Stefan well enough to say that he would not make this up simple because he doesn't need to. He is very well known anyway so this is not a publicity issue for him. I 100% agree with Stefan's point of view about &lt;a href=&quot;https://twitter.com/i0n1c/status/606571889557925888&quot;&gt;denying people from speaking at conferences if they are known to take credit or sell code they don't own or have a license for&lt;/a&gt;. 
I encourage everybody to read up on this and to read statements made by BOTH sides. Please share your opinion with people who run conferences.
&lt;br&gt;&lt;br&gt;

Android now has a bug bounty program, or as the call it &lt;a href=&quot;https://www.google.com/about/appsecurity/android-rewards/index.html&quot;&gt;Android Security Rewards Program&lt;/a&gt;.
Pretty cool, I wonder if they get more submissions because of this.
&lt;br&gt;&lt;br&gt;
Apple tries to kill plain-text connections &lt;a href=&quot;http://www.cso.com.au/article/577197/apple-tells-ios-9-developers-use-https-exclusively/&quot;&gt;&quot;If you're developing a new app, you should use HTTPS exclusively.&quot;&lt;/A&gt;. This feature is called
App Transport Security (ATS) and in the current iOS 9 version it can still be disabled. See: &lt;a href=&quot;http://ste.vn/2015/06/10/configuring-app-transport-security-ios-9-osx-10-11/&quot;&gt;Configuring App Transport Security Exceptions in iOS 9 and OSX 10.11&lt;/a&gt;. 
&lt;br&gt;&lt;br&gt;
Android has had a similar feature for some time. Android M introduces a new Manifest option to declare if an app uses
clear text traffic or not. Deepening on this option the framework can deny clear text traffic from the app. A decent writeup on this topic is here: &lt;a href=&quot;https://koz.io/android-m-and-the-war-on-cleartext-traffic/&quot;&gt;Android M and the war on clear text traffic&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;


Links
&lt;ul&gt;
&lt;a href=&quot;http://www.taig.com/en/&quot;&gt;Untether TaiG Jailbreak Tool for iOS 8.3 &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://product.china-pub.com/4717225&quot;&gt;Hacking and Securing iOS Applications in Chinese&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://speakerdeck.com/fuzion24/blackhat-2015&quot;&gt;Remotely Abusing Android - Ryan Welton (slides)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/hugo-glez/dexstrings&quot;&gt;dexstrings Extracting the strings from the .dex files with meaning.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.nowsecure.com/blog/2015/06/15/a-pattern-for-remote-code-execution-using-arbitrary-file-writes-and-multidex-applications/&quot;&gt;A Pattern for Remote Code Execution using Arbitrary File Writes and MultiDex Applications&lt;/A&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.slideshare.net/jiahongfang5/qualcomm2015-jfang-nforest&quot;&gt;Digging for Android Kernel Bugs (slides)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://t.co/Ua33p4s4lf&quot;&gt;Man in the (Android) Middleware (slides)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/dosomder/byeselinux&quot;&gt;byeselinux: Android kernel module to bypass SELinux at boot. Made for XZDualRecovery (Xperia) and Lollipop firmwares. &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.malwarebytes.org/mobile-2/2015/06/complex-method-of-obfuscation-found-in-dropper-realshell/&quot;&gt;Complex Method of Obfuscation Found in Dropper RealShell&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://newandroidbook.com/tools/dextra.html&quot;&gt;The dextra utility began its life as an alternative to the AOSP's dexdump and dx ...&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ARM-software/arm-trusted-firmware&quot;&gt;ARM Trusted Firmware - version 1.1&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://opensecurity.in/reversing-dexguards-string-encryption/&quot;&gt;Reversing DexGuard's String Encryption&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://copperhead.co/2015/06/11/android-pax&quot;&gt;Integrating PaX into Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://plus.google.com/+JustinCaseAndroid/posts/5LXVTSZa9nd&quot;&gt;Yet Another Mediatek Backdoor (by @jcase)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.slideshare.net/jiahongfang5/mosec2015-jfang&quot;&gt;How to Root 10 Million Phones with One Exploit by Keen Team (slides) &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.nowsecure.com/blog/2015/06/09/understanding-android-s-application-update-cycles/&quot;&gt;Understanding Android's Application Update Cycles&lt;/A&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://people.mozilla.org/~fdesre/b2gdroid/&quot;&gt;Firefox OS on Android Devices &lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://translate.wooyun.io/2015/06/22/android-activtity-security.html&quot;&gt;Android Activity Security&lt;/A&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.mediafire.com/view/djdr5sw25dqrr3y/fitbit-hackinparis.pdf&quot;&gt;Fitness Tracker: Hack In Progress (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://census-labs.com/news/2015/06/18/fuzzing-objects-de-ART-HITB2015AMS/&quot;&gt;Fuzzing Objects d’ART — Hack In The Box 2015 Amsterdam&lt;/A&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update June 2015</title>
 <pubDate>Mon, 08 Jun 2015 22:55:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2015/06/08#mobile_security_news_update_june2015</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://www.blackhat.com/us-15/briefings.html&quot;&gt;Black Hat USA&lt;/A&gt; 
AH! UNIVERSAL ANDROID ROOTING IS BACK by Wen Xu; ANDROID SECURITY STATE OF THE UNION by Adrian Ludwig; ATTACKING YOUR TRUSTED CORE: EXPLOITING TRUSTZONE ON ANDROID by Di Shen; CERTIFI-GATE: FRONT-DOOR ACCESS TO PWNING MILLIONS OF ANDROIDS by Ohad Bobrov &amp;  Avi Bashan; CLONING 3G/4G SIM CARDS WITH A PC AND AN OSCILLOSCOPE: LESSONS LEARNED IN PHYSICAL SECURITY by Yu Yu; COMMERCIAL MOBILE SPYWARE - DETECTING THE UNDETECTABLE by Joshua Dalman &amp;  Valerie Hantke; CRASH &amp; PAY: HOW TO OWN AND CLONE CONTACTLESS PAYMENT DEVICES by Peter Fillmore; FAUX DISK ENCRYPTION: REALITIES OF SECURE STORAGE ON MOBILE DEVICES by Daniel Mayer &amp;  Drew Suarez; FINGERPRINTS ON MOBILE DEVICES: ABUSING AND LEAKING by Yulong Zhang &amp;  Tao Wei; FUZZING ANDROID SYSTEM SERVICES BY BINDER CALL TO ESCALATE PRIVILEGE by Guang Gong; MOBILE POINT OF SCAM: ATTACKING THE SQUARE READER by Alexandrea Mellen &amp;  John Moore &amp;  Artem Losev; REVIEW AND EXPLOIT NEGLECTED ATTACK SURFACES IN IOS 8 by Tielei Wang &amp;  HAO XU &amp;  Xiaobo Chen; STAGEFRIGHT: SCARY CODE IN THE HEART OF ANDROID by Joshua Drake; THIS IS DEEPERENT: TRACKING APP BEHAVIORS WITH (NOTHING CHANGED) PHONE FOR EVASIVE ANDROID MALWARE by Yeongung Park &amp;  Jun Young Choi; TRUSTKIT: CODE INJECTION ON IOS 8 FOR THE GREATER GOOD by Alban Diquet &amp;  Eric Castro &amp;  Angela Chow
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://defcon.org/html/defcon-23/dc-23-speakers.html&quot;&gt;Defcon&lt;/a&gt; RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID by Francis Brown and Shubham Shah; How to Shot Web: Web and mobile hacking in 2015 by Jason Haddix; LTE Recon and Tracking with RTLSDR by Ian Kline; Extracting the Painful (blue)tooth by Matteo Beccaro and  Matteo Collura; Stagefright: Scary Code in the Heart of Android by Joshua J Drake; Build a free cellular traffic capture tool with a vxworks based femoto by Yuwei Zheng and Haoqi Shan 
&lt;/ul&gt;
&lt;br&gt;
This year Black Hat US really has a large number of mobile related talks!
&lt;br&gt;&lt;br&gt;
There is not too much to talk about otherwise. I still have to read all the stuff about Android M, some stuff is covered in the links section below. Make sure to checkout some of the HITB Amsterdam 2015 slides. Some good stuff in there for us mobile sec people.
&lt;br&gt;&lt;br&gt;
I was really amazed how much publicity the iOS messaging crash got. Yes, it was easy to trigger. But yes, this kind of stuff happened before. 
&lt;br&gt;&lt;br&gt;
Links
&lt;ul&gt;
&lt;a href=&quot;https://github.com/google/enjarify&quot;&gt;Enjarify is a tool for translating Dalvik bytecode to equivalent Java bytecode. This allows Java analysis tools to analyze Android applications.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/jansoucek/iOS-Mail.app-inject-kit/tree/master&quot;&gt;iOS 8.3 Mail.app inject kit&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://nelenkov.blogspot.com/2015/06/keystore-redesign-in-android-m.html&quot;&gt;Keystore redesign in Android M&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/strazzere/010Editor-stuff/commit/9815bf24c79ec62d872654c92f57d4cc191848ec&quot;&gt; 010Editor script for extracting multiple dex files from anything - works for (system) &lt;/A&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://newcircle.com/s/post/1737/2015/05/31/the-new-android-m-permissions-model&quot;&gt;Android 'M' Permissions and Legacy Applications&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/rednaga/disclosures/blob/master/GetSuperSerial.md&quot;&gt;CVE-2015-2231 CVE-2015-2232&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/nelenkov/keystore-decryptor&quot;&gt;Android key blob decryptor&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://speakerdeck.com/pelotasplus/how-to-recognise-that-the-user-has-just-uninstalled-your-app&quot;&gt;How to recognize your app is being uninstalled (Android)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/hardenedlinux/armv7-nexus7-grsec&quot;&gt;PaX/Grsecurity patch for Nexus7, which the original version is 3.4 kernel based with a bunch of backport features and fixes.&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://adamdoupe.com/publications/large-scale-study-of-mobile-web-app-security-most2015.pdf?utm_content=buffer6fd8d&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer&quot;&gt;A Large-Scale Study of Mobile Web App Security&lt;/a&gt; Android WebView&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.zerodayinitiative.com/advisories/ZDI-15-092/&quot;&gt;(Mobile Pwn2Own) Google Android Bluetooth Forced Pairing Vulnerability&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://conference.hitb.org/hitbsecconf2015ams/materials/&quot;&gt;HITB Amsterdam 2015 slides&lt;/a&gt; a bunch of mobile talks.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://gizmodo.com/a-simple-text-can-crash-messages-on-any-iphone-its-sent-1707128470?utm_campaign=socialflow_gizmodo_twitter&amp;utm_source=gizmodo_twitter&amp;utm_medium=socialflow&quot;&gt;A Simple Text Can Crash Messages on Any iPhone It's Sent To&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.cl.cam.ac.uk/~rja14/Papers/fr_most15.pdf&quot;&gt;Security Analysis of Android Factory Resets&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://seclists.org/fulldisclosure/2015/May/78&quot;&gt;Xamarin for Android &lt;5.1 DLL Hijack Vulnerability&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update May 2015 part 2</title>
 <pubDate>Mon, 18 May 2015 17:46:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2015/05/18#mobile_security_update_may2015_part2</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;http://www.sourceconference.com/#!boston-2015-agenda/c7dp&quot;&gt;SourceBoston&lt;/a&gt; Mat 2015: A Swift Teardown by Jared Carlson; iOS App Analytics VS Privacy: An analysis of the use of analytics by Guillaume Ross. (they still have TBD slots)
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://recon.cx/&quot;&gt;ReCon&lt;/a&gt; Montreal, Canada (June): Building a Better Bluetooth Attack Framework by Chris Weedon&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/us-15/briefings.html&quot;&gt;Black Hat USA&lt;/a&gt; ADVENTURES IN FEMTOLAND: 350 YUAN FOR INVALUABLE FUN by Alexey Osipov &amp;  Alexander Zaitsev; ATTACKING YOUR TRUSTED CORE: EXPLOITING TRUSTZONE ON ANDROID by Di Shen; CERTIFI-GATE: FRONT-DOOR ACCESS TO PWNING MILLIONS OF ANDROIDS by Ohad Bobrov &amp;  Avi Bashan; FAUX DISK ENCRYPTION: REALITIES OF SECURE STORAGE ON MOBILE DEVICES by Daniel Mayer &amp;  Drew Suarez; HACKING INTO SMARTPHONES AND CARS WITH A SIM CARD by Matt Spisak; STAGEFRIGHT: SCARY CODE IN THE HEART OF ANDROID by Joshua Drake; TRUSTKIT: CODE INJECTION ON IOS 8 FOR THE GREATER GOOD by Alban Diquet &amp;  Eric Castro
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://confidence.org.pl/en/&quot;&gt;CONFidence&lt;/a&gt; Krakow: iOS Hacking: Advanced Pentest &amp; Forensic Techniques by Omer S. Coskun; Abusing apns for profit by Karol Wiesek&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://defcon.org/html/defcon-23/dc-23-speakers.html&quot;&gt;Defcon&lt;/a&gt; Extracting the Painful (blue)tooth by Matteo Beccaro and Matteo Collura; Build a free cellular traffic capture tool with a vxworks based femoto by Yuwei Zheng and Haoqi Shan &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://usmile.at/symposium&quot;&gt;Android Security Symposium&lt;/a&gt;  Vienna, Austria, from 9-11 September 2015. Only Android security talks!&lt;br&gt;
&lt;/ul&gt;
Some of the upcoming conferences I covered in earlier month (e.g. HITB Amsterdam).
&lt;br&gt;&lt;br&gt;
CFPs
&lt;ul&gt;
&lt;a href=&quot;https://ruxconbreakpoint.com/cfp/&quot;&gt;Breakpoint&lt;/a&gt; Melbourne,  Australia, October  22th-23th&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.sec-t.org/2015/CFP&quot;&gt;SEC-T&lt;/a&gt; Stockholm 17-18:th of September 2015&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://44con.com/cfp2015/&quot;&gt;44con&lt;/a&gt;&lt;br&gt;&lt;br&gt;
The Chaos Communication Camp cfp just closed yesterday.&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
&lt;b&gt;iPhone:&lt;/b&gt; I bought an iPhone 5c (as a tryout device) like two weeks ago. I used to have a iPhone 3G back in 2009. I'm pretty happy with it, usability is great and the radio/antenna seems way better then the one in the Nexus 5. One thing I noticed is that most major apps are much better on the iPhone. There are exceptions like Dropbox. The Dropbox client is missing features compared with the android version. I'm missing the text editor! Also inter-app communication is really a weakness of iOS and a strength of Android.
Other annoying stuff: I can't set Chrome to be the default browser. I can't have Signal as the default SMS app. One of the most annoying things are notifications. Many apps don't support privacy friendly notifications on the lock screen. I want to see if there are new emails in an account but I don't want the sender, subject, or content to be shown. The same is true with a lot of apps. It is either no notification or notification with content. Not happy with this! But I'm a big fan of handover. &lt;br&gt;&lt;br&gt;
I total I'm still happy with my tryout iPhone 5c. Let's see how long.
&lt;br&gt;&lt;br&gt;
&lt;b&gt;Mobile Killswitch:&lt;/b&gt; The &lt;a href=&quot;https://gigaom.com/2014/08/26/mobile-phone-kill-switches-to-be-law-in-california-but-critics-worry-about-misuse/&quot;&gt;mobile killswitch&lt;/a&gt; now has it's first possibility for abuse: &lt;a href=&quot;https://twitter.com/jcase/status/596843513406496769&quot;&gt;So this killswitch tech in mobile phones now, kinda scary, especially when I can lock you out from your phone from an app w/ no root&lt;/A&gt; by @jcase.&lt;br&gt;&lt;br&gt;
&lt;br&gt;
Links
&lt;ul&gt;
&lt;a href=&quot;https://www.duosecurity.com/resources/calendar&quot;&gt;Security Conference Calendar&lt;/a&gt; by DuoSecurity&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.youtube.com/channel/UCx5hZiie0VzFvV-u376v7DQ&quot;&gt;SyScan 2015&lt;/a&gt; talks on YouTube&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://plus.google.com/+JustinCaseAndroid/posts/SBsui8XnE2b&quot;&gt;System -&gt; root backdoor in ZTE devices &lt;/a&gt;&lt;br&gt;&lt;bR&gt;
&lt;a href=&quot;https://copperhead.co/2015/05/11/aslr-android-zygote&quot;&gt;The state of ASLR on Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://nelenkov.blogspot.com/2015/05/hardware-accelerated-disk-encryption-in.html&quot;&gt;Hardware-accelerated disk encryption in Android 5.1&lt;/a&gt; I once supervised a &lt;a href=&quot;http://www.isti.tu-berlin.de/fileadmin/fg214/matthias_petschick.pdf&quot;&gt;student project&lt;/a&gt; to implement HW accelerated FDE for unmanaged flash on a Nokia N900&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/serianox/rd&quot;&gt;Android anti-root detection Proof of Concept&lt;/a&gt; this is a fun subject, I have been playing around in this area myself.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://forum.xda-developers.com/galaxy-s6/general/root-pingpongroot-s6-root-tool-t3103016/post60600131#post60600131&quot;&gt;Ping Pong Root for S6&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://plus.google.com/+JustinCaseAndroid/posts/KzgyHLgVhwo&quot;&gt;bypassing ZTE zMax Write protection&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/darshakframework/darshak&quot;&gt;Darshak&lt;/a&gt; updated version!&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://docs.google.com/file/d/0B_qgg13YkpypUHBKeUhYcG5Kakk/edit&quot;&gt;Times 'a Ticking...  to Forensicate the Apple Watch!&lt;/a&gt; slides&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://mherfurt.wordpress.com/2015/05/08/tricking-android-smart-lock-with-bluetooth/&quot;&gt;Tricking Android Smart Lock with Bluetooth&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://grepular.com/An_NFC_PGP_SmartCard_For_Android&quot;&gt;An NFC PGP SmartCard For Android&lt;/A&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/maldroid/maldrolyzer&quot;&gt;Simple framework to extract &quot;actionable&quot; data from Android malware (C&amp;Cs, phone numbers etc.)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.insinuator.net/2015/05/how-to-get-as-basestation/&quot;&gt;How to Get a BaseStation&lt;/a&gt; from the good guys at ERNW&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://docs.google.com/spreadsheets/d/1sAOGvYW2QDqdkrb1u0Do4Y9nZQ3SnBbwgh4B2-utHFA/edit#gid=928406745&quot;&gt;iOS release dates&lt;/a&gt; all of them&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.aboutphone.info/lib/phreak/boxes-2.html&quot;&gt;The definitive guide to Phreak Boxes&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/viaforensics/android-forensics&quot;&gt;Open source Android Forensics app and framework&lt;/a&gt; from viaforensics&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://forensics.spreitzenbarth.de/2015/05/18/our-android-malware-summary-for-the-year-2014/&quot;&gt;Our Android Malware Summary for the Year 2014&lt;/A&gt; mobile sandbox team&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update May 2015</title>
 <pubDate>Wed, 06 May 2015 05:01:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2015/05/06#mobile_security_news_update_May2015</link>
 <description>
This is actually a delayed April update!&lt;br&gt;&lt;br&gt;

Conferences
&lt;ul&gt;
&lt;a href=&quot;https://circlecitycon.com/talks&quot;&gt;CircleCityCon&lt;/a&gt; Indianapolis. ZitMo NoM - Clientless Android Malware Control by David Schwartzberg. Making Android's Bootable Recovery Work For You by Drew Suarez. Hacking the Jolla: An Intro to Assessing A Mobile Device by Vitaly McLain and Drew Suarez. &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.shakacon.org/&quot;&gt;ShakaCon&lt;/a&gt; Hawaii. Making Android's Bootable Recovery Work for You by Drew Suarez.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.phdays.com/program/&quot;&gt;PhDays&lt;/a&gt; Moscow. Fighting Payment Fraud Within Mobile NetworksTech by Denis Gorchakov and Nikolai Goncharov. GSM Signal Interception ProtectionFast Track by  Sergey Kharkov and  Artyom Poltorzhitsky. RFID/NFC for the MassesHands-on Labs by  Nahuel Grisolia. iOS Application Exploitation by Prateek Gianchandani.&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
In the last weeks I went to RSA Conference to hangout with a few people. I met the good guys from &lt;a href=&quot;https://www.nowsecure.com/&quot;&gt;NowSecure&lt;/a&gt; and &lt;a href=&quot;https://www.zimperium.com/&quot;&gt;Zimperium&lt;/a&gt; as well as the fellows of &lt;a href=&quot;http://www.duosecurity.com&quot;&gt;DuoSecurity&lt;/a&gt;. 
&lt;br&gt;&lt;br&gt;
The week after I attended &lt;a href=&quot;https://www.qualcomm.com/news/onq/2015/03/13/qualcomm-mobile-security-summit-2015-agenda-announcement&quot;&gt;Qualcomm Mobile Security Summit 2015&lt;/a&gt;. Again this was a super interesting mobile security focused event, most likely the best one of the year. Good talks and good people. There is no general posting of slides but some presenters published their slide deck. Tim and jcase posted their slides here: &lt;a href=&quot;http://strazzere.com/papers/AAP-QPSI.pdf&quot;&gt;Android APP Protection&lt;/a&gt;. It was good to meet some guys from @K33nTeam. Their presentation was pretty good too.
&lt;br&gt;&lt;br&gt;

If you are interested in learning about Android security take Jduck's and Zach's training at &lt;a href=&quot;https://www.derbycon.com/training-courses/&quot;&gt;DerbyCon&lt;/a&gt;. They know what they are talking about.&lt;br&gt;&lt;br&gt;

This picture is sadly very true. I really dislike the trend going towards big smartphones or &lt;a href=&quot;http://en.wikipedia.org/wiki/Phablet&quot;&gt;phablets&lt;/a&gt;.&lt;bR&gt;
&lt;img src=&quot;/images/mobilephonevo.jpg&quot;&gt;&lt;br&gt;&lt;br&gt;

&lt;b&gt;Nexus 5 issue&lt;/b&gt; after a long and painful struggle including factory resetting my Nexus 5 and downgrading it to Android 5.0.1 I gave up and determined that it must be a hardware fault. Most likely the power button. I also found out (via @mweissbacher) that the warranty of our Nexus 5 devices ran out in January :-(
&lt;br&gt;&lt;br&gt;
I determined that the only decent device to buy right now is a &lt;a href=&quot;http://www.motorola.com/us/home&quot;&gt;Moto X&lt;/a&gt; in the &lt;i&gt;Pure Edition&lt;/i&gt;. The pure edition is basically AOSP like shipped with the Nexus devices. So if you are looking for a normal sized smartphone that runs stock Android this might be a device for you. Motorola even states on their site that the pure edition receives more regular updates then carrier branded devices. Most likely also more frequent updates then devices that run a heavily modified Android version (shipped by most other manufacturers).
&lt;br&gt;&lt;br&gt;

News and Links
&lt;ul&gt;
&lt;a href=&quot;https://github.com/saelo/armpwn&quot;&gt;Repository to train/learn memory corruption on the ARM platform&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.firefart.at/how-to-crack-mifare-classic-cards/&quot;&gt;HOW TO CRACK MIFARE CLASSIC CARDS &lt;/a&gt; The end of the post shows how to &lt;i&gt;hack&lt;/i&gt; a tag to get more credit for a vending machine.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.rsaconference.com/writable/presentations/file_upload/br-w01-but-it_s-an-app-play-store-download-research-exposes-mobile-app-flaws.pdf&quot;&gt;https://www.rsaconference.com/writable/presentations/file_upload/br-w01-but-it_s-an-app-play-store-download-research-exposes-mobile-app-flaws.pdf&lt;/a&gt; talk at RSA&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.nes.fr/securitylab/?p=1865&quot;&gt;Android drive-by download&lt;/a&gt; in French (use Google Translate)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://packetstormsecurity.com/files/131510/adbbackup-traversal.txt&quot;&gt;ADB backup on Android version 4.0.4 allows for file overwrite via modified tar headers.&lt;/A&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/strazzere/ApkDetecter&quot;&gt;ApkDetecter&lt;/a&gt; Tool for providing Android APK protector detection with UI&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://forum.xda-developers.com/android/development/guide-root-method-lg-devices-t3049772&quot;&gt;New Root Method for LG Devices&lt;/a&gt; &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/CalebFenton/simplify&quot;&gt;Generic Android Deobfuscator&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/nforest/droidimg&quot;&gt;Android vmlinux loader&lt;/a&gt; by K33nTeam&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://seclists.org/bugtraq/2015/Apr/163?utm_source=twitterfeed&amp;utm_medium=twitter&quot;&gt;Android wpa_supplicant WLAN Direct remote buffer overflow&lt;/a&gt;&lt;br&gt;&lt;bR&gt;
A bunch of Android 4.x bugs &lt;a href=&quot;http://t.co/IoXym89HPt&quot;&gt;1&lt;/a&gt; &lt;a href=&quot;http://t.co/kN4BICspXz&quot;&gt;2&lt;/a&gt; &lt;a href=&quot;http://t.co/YuB2EcNndR&quot;&gt;3&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://dfrws.org/2015eu/proceedings/DFRWS-EU-2015-short-presentation-3.pdf&quot;&gt;HOW I FORCED AN ANDROID VULNERABILITY INTO BYPASSING MDM RESTRICTIONS + DIY MALWARE ANALYSIS&lt;/a&gt; (slides)&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://bbs.pediy.com/showthread.php?t=199176&quot;&gt;DEX Parser (Python) &lt;/A&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://speakerdeck.com/marcograss/codegate-the-nightmare-behind-the-cross-platform-mobile-apps-dream&quot;&gt;The nightmare behind the cross platform mobile apps dream&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.androidpolice.com/2015/04/09/developer-chainfire-publishes-preview-release-of-flashfire-a-spiritual-successor-to-mobile-odin/&quot;&gt;Developer Chainfire Publishes Preview Release Of FlashFire, A 'Spiritual Successor' To Mobile ODIN&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.mdsec.co.uk/2015/04/instrumenting-android-applications-with.html&quot;&gt;Instrumenting Android Applications with Frida&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://smile.amazon.com/gp/help/customer/display.html/ref=help_search_1-2?ie=UTF8&amp;nodeId=201497520&amp;qid=1422285091&amp;sr=1-2&quot;&gt;Amazon Fire Phone Source Code Notice&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://theroot.ninja/download.html&quot;&gt;SunShine 3.1 is out,  HTC m9 s-off support, as well as experimental simunlock for HTC GSM devices (no CDMA, no m9) &lt;/A&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.duosecurity.com/blog/duo-for-apple-watch&quot;&gt;DuoSecurity supports the Apple Watch for their push authentication app on iOS&lt;/A&gt; pretty cool actually!&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update March 2015</title>
 <pubDate>Tue, 31 Mar 2015 22:53:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2015/03/31#mobile_security_news_update_march_2015</link>
 <description>
Back from CanSec! Here the mobile update for March (barely made it!).&lt;br&gt;&lt;br&gt;

Conferences
&lt;ul&gt;
&lt;a href=&quot;https://www.rsaconference.com/events/us15/agenda/sessions?track=131&quot;&gt;RSA Conference&lt;/a&gt; has a mobile track (link points to track) but I'm not going to list each talk here.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/ldn-15/summit.html&quot;&gt;Black Hat Mobile Security Summit&lt;/a&gt; London, UK. Believe it or not it's all mobile talks! Mostly Android, one iOS and one Windows Phone talk and like 2 generic talks. 
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
CFPs
&lt;ul&gt;
&lt;A href=&quot;http://www.phdays.com/program/call_for_papers/&quot;&gt;PHDays&lt;/a&gt; CFP ends today March 31st!&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://masshackers.pbworks.com/w/page/93105360/BeaCon%202015&quot;&gt;BeaCon 2015&lt;/a&gt; mini con in Boston, MA, end of May.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.usenix.org/conference/woot15/call-for-papers&quot;&gt;Usenix WOOT'15&lt;/a&gt; submit your offense research!
&lt;/ul&gt;
&lt;br&gt;
&lt;br&gt;
&lt;b&gt;Android 5.1 / Nexus 5 issues:&lt;/b&gt; I recently updated to Android 5.1 (so did my friend Michael). Now we both have massive stability issues with our phones.
Michael actually doesn't have stability issues his phone refuses to boot up. It boots until the first colored dots appear and then reboots again. The reason for this &lt;i&gt;bootloop&lt;/i&gt; are unknown. Some people say this is due to issues with the phones power button. Michael indeed had some power button issues before the bootloop happened. My phone just started to randomly reboot. The issue seems known (search for &lt;a href=&quot;https://www.google.com/search?q=android+5.1+reboot+random&quot;&gt;Android 5.1 random reboot&lt;/a&gt; and you will find many reports).
&lt;br&gt;
&lt;br&gt;
Official &lt;A href=&quot;http://product.china-pub.com/3771022&quot;&gt;Chinese translation of The Android Hacker's Handbook&lt;/a&gt; available on April 10th.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://dimple.io/&quot;&gt;Dimple&lt;/a&gt; &lt;i&gt;is a small NFC sticker with four or two buttons for Android devices. You are the one who chooses the button functionality. It makes doing everyday tasks quicker and saves your precious time.&lt;/i&gt; &lt;-- from their website. This is basically a set of actual buttons (as in hardware) that you can stick on your Android. The buttons likely just activate a RFID tag that is picked up by your phone that then will perform some action. Very simple technology. Should be farely easy to hack (without physically pressing the button). Let's see, maybe I will order a sample just for fun. I have a pending Android NFC blog post anyway (but not time).&lt;br&gt;&lt;br&gt;
Links
&lt;ul&gt;
&lt;a href=&quot;https://www.virusbtn.com/blog/2015/03_30.xml?rss&amp;utm_content=buffer6f6de&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer&quot;&gt;Paper: a time line of mobile botnets&lt;/a&gt;&lt;bR&gt;&lt;br&gt;
&lt;a href=&quot;http://researchcenter.paloaltonetworks.com/2015/03/android-installer-hijacking-vulnerability-could-expose-android-users-to-malware/&quot;&gt;Android Installer Hijacking Vulnerability Could Expose Android Users to Malware&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://translate.google.com/translate?hl=en&amp;sl=fr&amp;u=http://www.zataz.com/piratage-de-cartes-bancaires-sans-fil-avec-une-application-android/&amp;prev=search&quot;&gt;Android NFC malware (MIFARE)&lt;/a&gt; would be interesting to get more information on this&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/securenetwork/NFCulT&quot;&gt;NFC Ultralight Toolkit&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://support.apple.com/en-us/HT204423&quot;&gt;CoreTelephony: Impact: A remote attacker can cause a device to unexpectedly restart
Description: A null pointer dereference issue existed in CoreTelephony's handling of Class 0 SMS messages. This issue was addressed through improved message validation.&lt;/a&gt; so those bugs still exist in iOS&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.change.org/p/apple-redheads-should-have-emoji-too&quot;&gt;Redheads should have emoji, too!&lt;/a&gt; sign the petition! ;-)&lt;br&gt;&lt;br&gt;
Android 4.4.4 local root PoCs for: &lt;a href=&quot;https://github.com/retme7/CVE-2014-7911_poc&quot;&gt;CVE-2014-7911&lt;/a&gt; and &lt;a href=&quot;https://github.com/retme7/CVE-2014-4322_poc&quot;&gt;CVE-2014-4322&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blogs.mcafee.com/mcafee-labs/amazon-gift-card-malware-spreading-via-sms&quot;&gt;Amazon Gift Card Malware Spreading via SMS&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.droidsec.org/wiki/&quot;&gt;Droidsec/wiki&lt;/a&gt; was updated!&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://events.linuxfoundation.org/sites/events/files/slides/ABS2015.pdf&quot;&gt;Fuzzing Android's media framework&lt;/a&gt; slides and &lt;a href=&quot;https://github.com/fuzzing/MFFA&quot;&gt;tools&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.raizlabs.com/dev/2014/03/wrangling-dalvik-memory-management-in-android-part-1-of-2/&quot;&gt;WRANGLING DALVIK: MEMORY MANAGEMENT IN ANDROID (PART 1 OF 2)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/MindMac/HideAndroidEmulator&quot;&gt;HideAndroidEmulator&lt;/a&gt; Detection and Prevention of Emulator Evading on Android&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.zerodayinitiative.com/advisories/ZDI-15-093/&quot;&gt;(Mobile Pwn2Own) Google Android DHCP Parsing Remote Code Execution Vulnerability&lt;/a&gt; fixed in Android 5.1&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://android-developers.blogspot.ca/2015/03/creating-better-user-experiences-on.html&quot;&gt;Creating Better User Experiences on Google Play&lt;/a&gt; also human review of apps&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://forensics.spreitzenbarth.de/2015/03/11/android-for-work-demystified/&quot;&gt;Android for Work: Demystified&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.rafayhackingarticles.net/2015/03/android-browser-kitkat-content-spoofing.html&quot;&gt;Android Browser Kitkat Content Spoofing Vulnerability&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://www.nextgov.com/cybersecurity/2015/03/pentagon-personnel-are-talking-nsa-proof-smartphones/108820/&quot;&gt;PENTAGON PERSONNEL NOW TALKING ON 'NSA-PROOF' SMARTPHONES&lt;/a&gt; funny, &lt;i&gt;the NSA didn't stop the purchase since they already know how to p0wn those pones&lt;/i&gt; (&lt;-- joke)&lt;br&gt;&lt;br&gt; 
&lt;a href=&quot;https://speakerdeck.com/marcograss/the-nightmare-behind-the-cross-platform-mobile-apps-dream&quot;&gt;The nightmare behind the cross platform mobile apps dream&lt;/A&gt; slides&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.blackhat.com/docs/asia-15/materials/asia-15-Sabanal-Hiding-Behind-ART.pdf&quot;&gt;Hiding Behind ART&lt;/a&gt; slides&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/docs/asia-15/materials/asia-15-Jung-DABiD-The-Powerful-Interactive-Android-Debugger-For-Android-Malware-Analysis.pdf&quot;&gt;DABiD The Powerful Interactive Android Debugger For Android Malware Analysis&lt;/a&gt; slides&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update February 2015 part 2</title>
 <pubDate>Fri, 27 Feb 2015 18:13:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2015/02/27#mobile_security_news_update_feb2015_p2</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;http://2015.brucon.org/index.php/Schedule&quot;&gt;BruCon&lt;/a&gt; 5-7 October: Daan Raman - A distributed approach to mobile malware scanning, Markus Vervier - Stealing a Mobile Identity Using Wormholes&lt;br&gt;&lt;Br&gt;
&lt;/ul&gt;
&lt;br&gt;

CFPs
&lt;ul&gt;
&lt;a href=&quot;https://www.sec-t.org/&quot;&gt;SEC-T&lt;/a&gt; Stockholm, Sweden.&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://recon.cx/2015/cfp.html&quot;&gt;ReCON&lt;/a&gt; Montreal, Canada&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://confidence.org.pl/cfp/&quot;&gt;Confidence&lt;/a&gt; Krakow, Poland&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://sourceconference.com/boston/&quot;&gt;Source&lt;/a&gt; Boston, MA, USA&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;

My good friend &lt;a href=&quot;http://twitter.com/nickdepetrillo/&quot;&gt;Nick&lt;/a&gt; has started a campaign to support Android users in risk and &lt;a href=&quot;https://twitter.com/nickdepetrillo/status/570620818918486016&quot;&gt;will provide free iPhones to them&lt;/a&gt;&lt;br&gt;&lt;br&gt;

Nice captures of what happens with the cellular service when the President is around: &lt;A href=&quot;https://twitter.com/dotMudge/status/566381002830794752&quot;&gt;1&lt;/a&gt; &lt;a href=&quot;https://twitter.com/dotMudge/status/566300960922677248&quot;&gt;2&lt;/a&gt;.&lt;br&gt;&lt;br&gt;

&lt;a href=&quot;https://twitter.com/mattblaze/status/571044238504411136&quot;&gt;Inside a StingRay&lt;/a&gt;. Matt Blaze would take your spare &lt;a href=&quot;https://twitter.com/mattblaze/status/571064484674080769&quot;&gt;StingRay base unit&lt;/a&gt;.&lt;br&gt;&lt;br&gt;

The Gemalto &lt;i&gt;hack&lt;/i&gt; by GSHQ/NSA makes a lot of sense and is pretty interesting. Stories by &lt;a href=&quot;http://www.wired.com/2015/02/gemalto-confirms-hacked-insists-nsa-didnt-get-crypto-keys/&quot;&gt;Wired&lt;/a&gt; and &lt;a href=&quot;http://www.theregister.co.uk/2015/02/25/gemalto_everythings_fine_security_industry_hang_on_a_minute/&quot;&gt;The Register&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;&lt;br&gt;

Links
&lt;ul&gt;
&lt;a href=&quot;https://bluebox.com/blog/business/how-safe-is-your-childs-tablet/&quot;&gt;How Safe is Your Child's Tablet: A review of the nine most popular models&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/jduck/android-cluster-toolkit&quot;&gt;Jduck's Android cluster toolkit&lt;/a&gt; recently updated&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/dmayer/idb&quot;&gt;Daniel's iOS pentesting and research toolkit&lt;/a&gt; recently updated&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://arxiv.org/pdf/1502.03182v1.pdf&quot;&gt;PowerSpy: Location Tracking using Mobile Device Power Analysis&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.ptsecurity.com/2015/02/the-research-mobile-internet-traffic.html&quot;&gt;Mobile Internet traffic hijacking via GTP and GRX&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.ptsecurity.com/download/Vulnerabilities_of_Mobile_Internet.pdf&quot;&gt;Vulnerabilities of GPRS&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://sourceforge.net/projects/pyprotosim/&quot;&gt;Python Protocol Simulator for SIM related protocols&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.reuters.com/article/2015/02/25/us-blackberry-google-idUSKBN0LT28N20150225?feedType=RSS&amp;feedName=technologyNews&quot;&gt;RIM helps Google to fix Android security&lt;/a&gt; Doesn't seem like the worst idea ever.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://s2lab.isg.rhul.ac.uk/vacancies/postdoc-mobsec/&quot;&gt;Postdoctoral position in Mobile Malware Analysis&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://www.reversephonelookup.org/smartphone-spying.php&quot;&gt;Is your phone spying on you?&lt;/a&gt; info graphic&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://genode.org/documentation/articles/trustzone&quot;&gt;An Exploration of ARM TrustZone&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://connortumbleson.com/2015/02/12/apktool-2-0-0-rc4-released/&quot;&gt;Apktool 2.0.0&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://thenewsh.blogspot.com/2015/02/disassembling-mobicore-trustlets.html&quot;&gt;Disassembling MobiCore Trustlets&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.fredericb.info/2014/12/qpsiir-80-qualcomm-trustzone-integer.html&quot;&gt;Qualcomm TrustZone Integer Signedness bug&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update February 2015</title>
 <pubDate>Wed, 11 Feb 2015 02:05:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2015/02/11#mobile_security_news_update_feb2015</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;http://www.insinuator.net/2015/02/troopers-telcosecday-next-talks&quot;&gt;TelcoSecDay @ Troopers&lt;/a&gt; Markus Vervier: Borrowing Mobile Network Identities -  Just Because We Can, Tobias Engel: Securing the SS7 Interconnect, Ravishankar Borgaonkar - TelcoSecurity Mirage: 1G to 5G, Dieter Spaar - How to Assess M2M Communication from an Attacker's Perspective.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.cansecwest.com&quot;&gt;CanSecWest&lt;/a&gt; Timur Yunusov &amp; Kirill Nesterov - Bootkit via SMS: 4G access level security assesment. Team Pangu  Userland Exploits of Pangu 8, the first untethered iOS8 jailbreak. 
&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://conference.hitb.org/hitbsecconf2015ams/sessions&quot;&gt;Hack in the Box Amsterdam&lt;/a&gt; The Savage Curtain: Mobile SSL Failures; Eight Ou Two Mobile; Mobile Authentication Subspace Travel; Fuzzing Objects d'ART: Digging Into the New Android L Runtime Internals; Relay Attacks in EMV Contactless Cards with Android OTS Devices; Bootkit via SMS: 4G Access Level Security Assessment
&lt;/ul&gt;
&lt;br&gt;
TelcoSecDay @ Troopers looks pretty awesome. Too bad that I can't go because of the 100% overlap with CanSec. Sadly this seems to be a new trend that a number of top conferences overlap or are so close to each other that it is impossible to attend both.

&lt;br&gt;&lt;br&gt;
Somebody is selling &lt;a href=&quot;https://twitter.com/_Dark_Knight_/status/558759717464338433&quot;&gt;fake versions of the Android Hacker's Handbook&lt;/a&gt; on Amazon. Indicators are missing pictures or the white book backside (original one is black).

&lt;br&gt;&lt;br&gt;

We recently presented &lt;a href=&quot;https://www.mulliner.org/collin/academic/publications/babelcrypt_fc15_slides.pdf&quot;&gt;BabelCrypt&lt;/a&gt; at Financial Crypto. I would love to see a &lt;i&gt;usable implementation&lt;/i&gt; of this. Unfortunately I don't have the time to make this happen. I would pay money for this app.
&lt;br&gt;&lt;br&gt;&lt;br&gt;

Links
&lt;ul&gt;
&lt;a href=&quot;https://community.rapid7.com/community/metasploit/blog/2015/02/10/r7-2015-02-google-play-store-x-frame-options-xfo-gaps-enable-android-remote-code-execution-rce&quot;&gt;Google Play Store X-Frame-Options (XFO) Gaps Enable Android Remote Code Execution (RCE)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.heise.de/ct/artikel/Beemer-Open-Thyself-Security-vulnerabilities-in-BMW-s-ConnectedDrive-2540957.html&quot;&gt;Beemer, Open Thyself! - Security vulnerabilities in BMW's ConnectedDrive&lt;/a&gt; (attack was carried out over the air)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://googleonlinesecurity.blogspot.com/2015/01/security-reward-programs-year-in-review.html&quot;&gt;Google Android and iOS apps now in scope for vulnerability rewards from Google&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/anwarelmakrahy/status/562535817462444032&quot;&gt;OpenBTS and Metasploit integration&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.azimuthsecurity.com/2015/01/blackpwn-blackphone-silenttext-type.html&quot;&gt;Blackphone p0wnd&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://census.tsyrklevich.net/&quot;&gt;AndroidCensus&lt;/a&gt; got updated again (+30 new samples)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://plus.google.com/+AdrianLudwig/posts/1md7ruEwBLF&quot;&gt;Adrian Ludwig's response on WebView vulns&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://bitbucket.org/jigsaw_echo/armexec&quot;&gt;Native Android Runtime Emulation&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/claud_xiao/status/563960896460824577&quot;&gt;Can you imagine Internet service provider hijack customers' traffic to replace APKs they're downloading? Well in CN everything is possible.&lt;/A&gt; (very interesting, I would love to see more data on this)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://forum.xda-developers.com/crossdevice-dev/sony/giefroot-rooting-tool-cve-2014-4322-t3011598&quot;&gt;giefroot: A tool to root your device using CVE-2014-7911 (by Keen Team) and CVE-2014-4322&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://researchcenter.paloaltonetworks.com/2015/01/cve-2014-7911-deep-dive-analysis-android-system-service-vulnerability-exploitation/&quot;&gt;CVE-2014-7911 - A Deep Dive Analysis of Android System Service Vulnerability and Exploitation&lt;/&gt;a&lt;br&gt;&lt;br&gt;

&lt;/ul&gt;
</description>
 </item>
  <item>
 <title>Mobile Security News Update January 2015</title>
 <pubDate>Tue, 20 Jan 2015 17:14:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2015/01/20#mobile_security_news_january_2015</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://syscan.org/&quot;&gt;SyScan&lt;/a&gt; Singapore, March. Dmitry Kurbatov: Attacks on telecom operators and mobile subscribers using SS7: from DoS to call interception. Peter Fillmore: Crash &amp; Pay: Owning and Cloning NFC Payment cards. Stefan Esser: iOS 678 Security - A Study in Fail.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/asia-15/briefings.html&quot;&gt;Black Hat Asia&lt;/a&gt; Singapore, March. (IN)SECURITY OF MOBILE BANKING by Eric Filiol &amp;  Paul Irolla. ATTACKING SAP MOBILE by Vahagn Vardanyan &amp;  Dmitry Chastuhin. DABID: THE POWERFUL INTERACTIVE ANDROID DEBUGGER FOR ANDROID MALWARE ANALYSIS by Jin-hyuk Jung &amp;  Jieun Lee. HIDING BEHIND ANDROID RUNTIME (ART) by Paul Sabanal. RELAYING EMV CONTACTLESS TRANSACTIONS USING OFF-THE-SHELF ANDROID DEVICES by Jordi Van den Breekel. RESURRECTING THE READ_LOGS PERMISSION ON SAMSUNG DEVICES by Ryan Johnson &amp;  Angelos Stavrou. THE NIGHTMARE BEHIND THE CROSS PLATFORM MOBILE APPS DREAM by Marco Grassi &amp;  Sebastian Guerrero. WE CAN STILL CRACK YOU! GENERAL UNPACKING METHOD FOR ANDROID PACKER (NO ROOT) by Yeonung Park.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
This year's SyScan unfortunatelly is &lt;a href=&quot;https://twitter.com/SyScan/status/553028816726405121&quot;&gt;the last one&lt;/a&gt;. Very sad to see this conference go away. SyScan was the first industry conference I spoke at! 
&lt;br&gt;&lt;br&gt;
There is a new mobile specific venu &lt;a href=&quot;https://www.blackhat.com/lon-cfp.html&quot;&gt;Black Hat Mobile Security Summit&lt;/a&gt; taking place in London in June.
&lt;br&gt;&lt;br&gt;

The problem with unpatched bugs in Android continues: &lt;a href=&quot;https://community.rapid7.com/community/metasploit/blog/2015/01/11/google-no-longer-provides-patches-for-webview-jelly-bean-and-prior&quot;&gt;Google No Longer Provides Patches for WebView Jelly Bean and Prior&lt;/a&gt;. This is really one of the major issues of Android security in my opinion. In 2013 I was working on a system that helps to address this issue. Details can be found here: &lt;a href=&quot;http://www.rekey.io&quot;&gt;1&lt;/a&gt; &lt;a href=&quot;http://www.patchdroid.com&quot;&gt;2&lt;/a&gt;.
&lt;br&gt;&lt;br&gt; 

Links
&lt;ul&gt;
&lt;a href=&quot;http://www.androiddrawer.com/&quot;&gt;Android Drawer&lt;/a&gt; directory of old versions of Android apps.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/ashishb/android-security-awesome&quot;&gt;Collection of Android Security Resources&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://isciurus.blogspot.cz/2015/01/android-app-with-full-control-over-your.html&quot;&gt;Android app with full control over your Google account&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://sseblog.ec-spride.de/2014/12/codeinspect/&quot;&gt;CodeInspect says Hello World: A new Reverse-Engineering Tool for Android and Java Bytecode&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://drive.google.com/file/d/0B-idfoGaBodCTmNINXpFMWhMdlU/view&quot;&gt;fotabinder mediatek exploit for MTK devices (Made for the Hummer phone, hence the offensive app name)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.adaptivemobile.com/blog/headsup-for-whatsapp&quot;&gt;HeadsUp for WhatsApp&lt;/A&gt;&lt;br&gt;&lt;br&gt;

&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update New Year's 2015 Edition</title>
 <pubDate>Fri, 02 Jan 2015 15:02:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2015/01/02#mobile_security_news_update_newyear2015</link>
 <description>
&lt;b&gt;Conferences&lt;/b&gt;
&lt;ul&gt;
&lt;a href=&quot;http://www.shmoocon.org/schedule&quot;&gt;ShmooCon&lt;/a&gt; January 2015. Knock Knock: A Survey of iOS Authentication Methods by David Schuetz; There's Waldo! Tracking Users via Mobile Apps by Colby Moore and Patrick Wardle; Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry by Kristen K. Greene, Joshua Franklin, and John Kelsey.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/asia-15/briefings.html&quot;&gt;Black Hat Asia&lt;/a&gt; March. DABID: THE POWERFUL INTERACTIVE ANDROID DEBUGGER FOR ANDROID MALWARE ANALYSIS by Jin-hyuk Jung &amp;  Jieun Lee; HIDING BEHIND ANDROID RUNTIME (ART) by Paul Sabanal; RELAYING EMV CONTACTLESS TRANSACTIONS USING OFF-THE-SHELF ANDROID DEVICES by Jordi Van den Breekel.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.troopers.de/troopers/agenda/&quot;&gt;Troopers&lt;/a&gt; March. Hacking FinSpy - a Case Study about how to Analyse and Defeat an Android Law-enforcement Spying App by Attila Marosi (not all speaker slots are filled)
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
&lt;b&gt;31c3 Review&lt;/b&gt;
&lt;br&gt;&lt;br&gt;
The Chaos Communication Congress was super fun again (no big surprise!). It was really good to see everybody again at the end of the year. As the congress is getting bigger and bigger every year it is hard to see people more once and I even missed a bunch of you guys! The talks were pretty good this year and I saw quite a few of them. Here a short overview of the mobile related talks that I actually saw live at the conference. Recordings are available: &lt;a href=&quot;http://media.ccc.de/browse/congress/2014/&quot;&gt;here&lt;/a&gt; Slides of most talks are linked in the schedule: &lt;a href=&quot;http://events.ccc.de/congress/2014/Fahrplan/schedule.html&quot;&gt;here&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
The &lt;a href=&quot;http://en.wikipedia.org/wiki/Signalling_System_No._7&quot;&gt;SS7&lt;/a&gt; talks were super interesting. I actually only saw 2 of the 3 talks on SS7 but I'll watch the third one once I get home. The summary of all the talks is: once you get access to SS7 you can &lt;a href=&quot;https://twitter.com/collinrm/status/548880189825236992&quot;&gt;easily track phones&lt;/a&gt; as often shown on TV shows. Commercial products exist to do this via SS7 (&lt;A href=&quot;https://twitter.com/collinrm/status/548878054983204864&quot;&gt;but depending on the manufacturer&lt;/a&gt; you cannot use it against every country). 
&lt;a href=&quot;https://twitter.com/collinrm/status/548895438683004928&quot;&gt;SS7-based tracking can be implemented in various&lt;/a&gt; ways as Karsten Nohl showed. Very interesting is the fact that &lt;a href=&quot;https://twitter.com/collinrm/status/548896626795106304&quot;&gt;IMSI Catchers can benefit from SS7 access&lt;/a&gt; as it can be used to access to encryption keys. This basically allows building 3G IMSI catchers. Karsten Nohl showed this live on stage (he intercepted a SMS). &lt;A href=&quot;https://twitter.com/collinrm/status/548883426380894208&quot;&gt;SS7 access can be used to steal SMS messages&lt;/a&gt; by redirecting the delivery path in the HLR. All in all you can conclude that organizations with SS7 access can do a lot of interesting/bad things. Luckily all the German operators already block many of the security critical SS7 messages from entering their network. SRLabs also released and Android application that analyzes the debug messages from Qualcomm-based phones to determine if your phone is in an unfriendly cellular environment. The tool is called &lt;a href=&quot;https://play.google.com/store/apps/details?id=de.srlabs.snoopsnitch&amp;hl=en&quot;&gt;SnoopSnitch&lt;/a&gt;.&lt;br&gt;&lt;br&gt;
Slides: &lt;a href=&quot;http://events.ccc.de/congress/2014/Fahrplan/system/attachments/2553/original/31c3-ss7-locate-track-manipulate.pdf&quot;&gt;1&lt;/a&gt;
&lt;a href=&quot;http://events.ccc.de/congress/2014/Fahrplan/system/attachments/2493/original/Mobile_Self_Defense-Karsten_Nohl-31C3-v1.pdf&quot;&gt;2&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
I also really enjoyed the talk from Sylvain Munaut about GMR-based Sat-Phones (specifically the technology used by Thuraya). He presented the progress of the Osmocom project's implementation of an &lt;a href=&quot;http://gmr.osmocom.org/trac/&quot;&gt;open GMR stack&lt;/a&gt;. One interesting detail was that you can break the GMR crypto within 500msec using a known plain text attack against the control traffic.
&lt;br&gt;&lt;br&gt;
Slides: &lt;a href=&quot;http://events.ccc.de/congress/2014/Fahrplan/system/attachments/2496/original/31c3_gmr.pdf&quot;&gt;1&lt;/a&gt;
&lt;br&gt;&lt;br&gt;

The talk about pagers based on the Iridium satellite network was similar interesting. The presenters build an SDR-based Iridium receiver and &lt;a href=&quot;https://twitter.com/collinrm/status/549235109287972864&quot;&gt;sniffed some paging traffic&lt;/a&gt; as the satellite beam covers a large region they were able to receive quite a lot of interesting messages. Yes, the traffic is not encrypted! Their code is available &lt;a href=&quot;https://github.com/muccc/iridium-toolkit&quot;&gt;here&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
Slides: &lt;a href=&quot;http://events.ccc.de/congress/2014/Fahrplan/system/attachments/2559/original/Iridium-Talk-Komplett.pdf&quot;&gt;1&lt;/a&gt;
&lt;br&gt;&lt;br&gt;

The guys from &lt;a href=&quot;http://scadasl.org&quot;&gt;@scadasl&lt;/a&gt; totally rocked the 31c3 as they also gave a lighting talk on their &lt;a href=&quot;https://twitter.com/collinrm/status/549557195617361920&quot;&gt;4G modem research&lt;/a&gt;. No slides unfortunately.
&lt;br&gt;&lt;br&gt;

The talk &lt;a href=&quot;http://events.ccc.de/congress/2014/Fahrplan/events/6450.html&quot;&gt;Ich sehe, also bin ich ... Du&lt;/a&gt; about biometrics vs. cameras by Starbug also looked into smartphone screen reflections in your eye. He showed that you can partially determine what your screen shows and what area you touched with your finger.

&lt;br&gt;&lt;br&gt;
The guys from the &lt;a href=&quot;http://events.ccc.de/congress/2014/wiki/Static:GSM&quot;&gt;31c3 GSM network&lt;/a&gt; where playing with the Alert system while I was visiting them in their NOC. One of the results is this:
&lt;blockquote class=&quot;twitter-tweet&quot; lang=&quot;en&quot;&gt;&lt;p&gt;Presidential Alert!! (All newer phones have this feature and you cannot turn it off) &lt;a href=&quot;https://twitter.com/hashtag/osmocom?src=hash&quot;&gt;#osmocom&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/31c3?src=hash&quot;&gt;#31c3&lt;/a&gt; &lt;a href=&quot;http://t.co/dFJu19F5he&quot;&gt;pic.twitter.com/dFJu19F5he&lt;/a&gt;&lt;/p&gt;&amp;mdash; tobias engel (@2b_as) &lt;a href=&quot;https://twitter.com/2b_as/status/549695235207737344&quot;&gt;December 29, 2014&lt;/a&gt;
&lt;img src=&quot;http://www.mulliner.org/images/B6Do5y3IMAAPfpX.png&quot; border=0 width=&quot;50%&quot;&gt;
&lt;/blockquote&gt;
&lt;br&gt;&lt;br&gt;
&lt;b&gt;Links&lt;/b&gt;
&lt;ul&gt;
&lt;a href=&quot;http://www.businessweek.com/articles/2014-12-15/verizons-new-encrypted-calling-app-plays-nice-with-the-nsa&quot;&gt;Verizon's New, Encrypted Calling App Plays Nice With the NSA&lt;/a&gt; pre-0wnd encryption, who needs this? 
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/idanr1986/cuckoo&quot;&gt;Cuckoo Sandbox for Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://opensecurity.in/research/security-analysis-of-android-browsers.html&quot;&gt;Security Analysis of commonly used Android Browsers&lt;/a&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update December 2014</title>
 <pubDate>Wed, 10 Dec 2014 16:59:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2014/12/10#mobile_security_news_update_dec_2014</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://www.kiwicon.org/the-con/schedule/&quot;&gt;Kiwicon&lt;/a&gt; (going down right now) Wellington, NZ. MitMing GSM with criminal intent by William &quot;AmmonRa&quot; Turner&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://events.ccc.de/congress/2014/Fahrplan/&quot;&gt;31C3&lt;/a&gt; Hamburg, Germany. (In)Security of Mobile Banking by Paul Irolla and Eric Filiol; Mobile self-defense  by Karsten Nohl; osmo-gmr: What's new?  by tnt; SS7: Locate. Track. Manipulate.  by Tobias Engel; SS7map : mapping vulnerability of the international mobile roaming infrastructure by Laurent Ghigonis and Alexandre De Oliveira; Unlocking the bootloader of the BlackBerry 9900  by Alex
&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;http://www.shmoocon.org/speakers&quot;&gt;ShmooCon&lt;/a&gt; Washington D.C., Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry by Kristen K. Greene, Joshua Franklin, and John Kelsey (not all talks posted yet).
&lt;/ul&gt;
&lt;br&gt;
31C3 has an impressive number of good mobile security related talks, in addition to a lot of other good looking security talks. This will be good!
&lt;br&gt;&lt;br&gt;
We recently finished a research project on end-to-end encryption for mobile messaging apps. The idea was to have a universal &quot;plugin&quot; that encrypts messages before they are handed over to the messaging app. This way you can use any messaging app with the add-on of end-to-end encryption (providing the other end has the same tool installed too). The result was &lt;b&gt;BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications&lt;/b&gt; a joint project with my co-researchers and interns at &lt;a href=&quot;http://seclab.ccs.neu.edu&quot;&gt;NEU SecLab&lt;/a&gt;. The paper is going to be published in January 2015. A pre-print is available here: &lt;a href=&quot;http://mulliner.org/collin/academic/publications/babelcrypt.pdf&quot;&gt;BabelCrypt&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
&lt;br&gt;
News / Links
&lt;ul&gt;
&lt;a href=&quot;https://www.onlinestatusmonitor.com/&quot;&gt;OnlineStatusMonitor&lt;/a&gt; is a project that monitored online status of random users of WhatsApp messenger. They show that you can learn a lot about user behavior by just monitoring their online status.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://census.tsyrklevich.net/&quot;&gt;Android Census&lt;/a&gt; Vlad updated his Android Census&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://code.google.com/p/dynamorio/source/list&quot;&gt;DynamoRio&lt;/a&gt; is working on an ARM port.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/CyboLabs/Open_Bump&quot;&gt;OpenBump&lt;/A&gt; LG bootloader backdoor to boot unsigned images.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.lookout.com/blog/2014/12/04/deathring/&quot;&gt;Smartphones (Android) with pre-loaded malware&lt;/a&gt; but only on cheap clones
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
Word on the street is that all the cool kids are getting &lt;i&gt;pagers&lt;/i&gt; again!</description>
 </item>
  <item>
 <title>Mobile Security News Update November 2014</title>
 <pubDate>Sun, 23 Nov 2014 23:44:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2014/11/23#mobile_security_news_update_nov2014</link>
 <description>
I'm still waiting for the &lt;a href=&quot;http://events.ccc.de/&quot;&gt;31C3&lt;/a&gt; program to be released, but since I was reviewing the security submissions I can tell you that there will be a bunch of good mobile security related talks this year. As usual I will be in Hamburg to attend CCC.
&lt;br&gt;&lt;br&gt;

So far there are no upcoming conferences that have released their program yet.
&lt;br&gt;&lt;br&gt;

I've recently updated to Android 5.0. Overall I think it turned out quite nice. The changes related to notifications suck really badly. Apparently you cannot turn off audio and vibration but still get the visual notification (LED). I really liked the old way to set notifications: ring/vibrate/off.
The extended battery time everybody is talking about I don't recognize (Nexus 5). The more tight integration with googles services sucks too. Why does it need to show my google account logo on the top right of my status bar? This is useful for what?
&lt;br&gt;&lt;br&gt; 

Links and Stories:
&lt;ul&gt;
&lt;a href=&quot;http://androiddevice.info/&quot;&gt;Android Device Inventory&lt;/a&gt; collect information about Android devices. Created by @thuxnder&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.theregister.co.uk/2014/11/19/sms_pwnage_on_meellions_of_flawed_sim_cards_popular_4g_modems/&quot;&gt;Owning a computer via 4G modem an SMS&lt;/A&gt; I want more details, I couldn't find the slides of the talk.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://extensiondefender.com/blog/red-alert-dangerous-exploit-poses-major-threat-to-all-android-users/&quot;&gt;RED ALERT: Dangerous Exploit Poses Major Threat To All Android Users&lt;/a&gt; a browser extension from an Ad company tries to push an APK to your phone. &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://secupwn.github.io/Android-IMSI-Catcher-Detector/&quot;&gt;Android IMSI Catcher Detector&lt;/a&gt; seems like an interesting project, they seem to have an early alpha release.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.zdnet.com/lollipop-stops-chromium-bugs-from-endangering-android-7000035032/&quot;&gt;Lollipop stops Chromium bugs from endangering Android&lt;/a&gt; History of Android Browser engines and security. via @jduck
&lt;/ul&gt;

Android bugs:
&lt;ul&gt;
&lt;a href=&quot;https://github.com/retme7/broadAnyWhere_poc_by_retme_bug_17356824&quot;&gt;broadAnyWhere&lt;/a&gt; seems like you can send broadcast events to any receiver. I still haven't figured out the details yet.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://seclists.org/fulldisclosure/2014/Nov/51&quot;&gt;CVE-2014-7911: Android &lt;5.0 Privilege Escalation using ObjectInputStream&lt;/a&gt; looks pretty interesting, I would like to see a working exploit for this.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.exploit-db.com/exploits/35282/&quot;&gt;Samsung Galaxy KNOX Android Browser RCE&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.quarkslab.com/abusing-samsung-knox-to-remotely-install-a-malicious-application-story-of-a-half-patched-vulnerability.html&quot;&gt;Abusing Samsung KNOX to remotely install a malicious application: story of a half patched vulnerability&lt;/a&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update October 2014</title>
 <pubDate>Thu, 23 Oct 2014 20:04:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2014/10/23#mobilesecuritynewsupdate_october2014</link>
 <description>
Time files, I've been super busy the last two month and will be busy until mid/end of November. I just relaized that
I haven't posted anything in September at all.
&lt;br&gt;&lt;br&gt;
Conferences
&lt;ul&gt;
&lt;a href=&quot;http://2014.hack.lu/index.php/Agenda&quot;&gt;Hack.Lu&lt;/a&gt; October 21-24: Stripping the controversial FinFisher application for Android phones by Attila Marosi;  SherlockDroid, an Inspector for Android Marketplaces by Axelle Apvrille, Ludovic Apvrille
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://pacsec.jp&quot;&gt;PacSec&lt;/a&gt; Tokyo, Nov 12-13: An Infestation of Dragons: Exploring Vulnerabilities in the ARM TrustZone Architecture by Josh &quot;m0nk&quot; Thomas, Charles Holmes, Nathan Keltner; Hey, we catch you - dynamic analysis of Android applications by
Wenjun Hu; Root via SMS: 4G access level security assessment by Sergey Gordeychik, Alexander Zaytsev; Blowing up the Celly - Building Your Own SMS/MMS Fuzzer by Brian Gorenc and Matt Molinyawe.
&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.deepsec.net/&quot;&gt;DeepSec&lt;/a&gt; Vienna, Nov 18-21: Mobile SSL Failures by Tony Trummer &amp; Tushar Dalvi; TextSecure and RedPhone-bring them to iOS by Christine Corbett; Creating a kewl and simple Cheating Platform on Android by Milan Gabor &amp; Danijel Grah
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
There is again a new talk on SMS and MMS fuzzing. I really wonder what is going to be different from all the previous work?
&lt;br&gt;&lt;br&gt;

Links
&lt;ul&gt;
&lt;a href=&quot;https://www.blackhat.com/docs/eu-14/materials/eu-14-Apvrille-Hide-Android-Applications-In-Images-wp.pdf&quot;&gt;Hiding Android Applications in Images&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://mobilesecurityares.blogspot.de/2014/10/why-samsung-knox-isnt-really-fort-knox.html&quot;&gt;Why Samsung Knox isn't really a Fort Knox&lt;/a&gt; Summary: Samsung KNOX only obfuscates password and basically stores it in the clear&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://gist.github.com/jduck/4336d6f43d7fdb987ef2&quot;&gt;Disable all Trusted CA CERTs on Android 4.x and later (requires root)&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://androidvulnerabilities.org/index.html&quot;&gt;Android Vulnerabilities&lt;/A&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.forbes.com/sites/ellenhuet/2014/10/15/android-lollipop-kill-switch/&quot;&gt;About the Android Lollipop kill switch&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://speakerdeck.com/marcograss/reverse-engineering-of-a-commercial-spyware-for-ios-and-android&quot;&gt;Reverse engineering of a commercial spyware for ios and android&lt;/a&gt; (slides)&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update August 2014</title>
 <pubDate>Sat, 30 Aug 2014 20:01:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2014/08/30#mobile_security_news_update_august14</link>
 <description>
The Vegas week was as great as it can be as anybody knows who has this ongoing love hate relationship with the yearly pilgrimage.
&lt;br&gt;&lt;br&gt;

The Blackphone kinda got rooted, &lt;a href=&quot;http://arstechnica.com/security/2014/08/blackphone-goes-to-def-con-and-gets-hacked-sort-of/&quot;&gt;ars on Blackphone root&lt;/a&gt; I had to laugh so hard when I saw &lt;A href=&quot;https://twitter.com/TeamAndIRC&quot;&gt;Jon&lt;/a&gt; running around in his new t-shirt.
&lt;br&gt;&lt;br&gt;
The &lt;a href=&quot;http://securitycookies.net/&quot;&gt;SecurityCookies&lt;/a&gt; project was a lot of fun. I think people really liked it, likely &lt;a href=&quot;https://twitter.com/gepeto42&quot;&gt;Guillaume&lt;/a&gt; and I had the most fun. We will likely do this again at some point. 
&lt;br&gt;
&lt;br&gt;
The iPhone is finally getting &lt;a href=&quot;http://en.wikipedia.org/wiki/Near_field_communication&quot;&gt;NFC&lt;/a&gt; &lt;A href=&quot;http://www.theverge.com/2014/8/28/6078359/iphone-6-will-feature-nfc-and-apple-mobile-payments&quot;&gt;iPhone 6 will reportedly feature NFC and Apple's own mobile payments platform&lt;/a&gt;. This should be a lot of fun cause everybody will scramble to actually build and deploy NFC now. I'm not really worried about NFC-payment insecurity but about all the other fun stuff that will be possible. Maybe I have to buy an iPhone 6 and continue &lt;a href=&quot;http://www.mulliner.org/nfc/&quot;&gt;my NFC work&lt;/a&gt;.
&lt;br&gt;&lt;Br&gt;
If I actually do get an iPhone I should also get the &lt;a href=&quot;http://www.flir.com/flirone/&quot;&gt;FLIR ONE&lt;/a&gt; an thermal camera case for iPhones. There are various articles about what you could do with this and I think this could be super interesting to play with.
&lt;br&gt;&lt;br&gt;
My friend &lt;a href=&quot;&quot;&gt;Ravi&lt;/a&gt; released &lt;a href=&quot;https://github.com/darshakframework/darshak&quot;&gt;darshak&lt;/A&gt; an Android app that notifies you if your phone receives &lt;i&gt;silent SMS&lt;/i&gt; that are used for tracking your phone. It further displays current network security settings. This can be an indicator about your phone being connected to an IMSI-catcher. So far you need to have a Samsung Galaxy S3 to use this tool, but the S3 is fairly popular. I would like to see vendors providing information about phone network security parameters to the user.
&lt;br&gt;
&lt;br&gt;  
Conferences
&lt;ul&gt;
&lt;a href=&quot;http://44con.com/talks/&quot;&gt;44con&lt;/a&gt; September 10-11 London, UK: GreedyBTS: Hacking Adventures in GSM by Hacker Fantastic; Researching Android Device Security with the Help of a Droid Army by Joshua J. Drake (jduck); Manna from Heaven; Improving the state of wireless rogue AP attacks by Dominic White; On Her Majesty's Secret Service: GRX and a Spy Agencyby Stephen Kho; Darshak: how to turn your phone into a low cost IMSI catcher device by Ravishankar Borgaonkar &amp; Swapnil Udar&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://sec-t.org&quot;&gt;SEC-T&lt;/a&gt; September 18-19 Stockholm, Sweden: Attacking Mobile Broadband Modems Like A Criminal by Andreas Lind&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://t2.fi/schedule/2014/&quot;&gt;T2&lt;/a&gt; October 23-24, Helsinki, Finland: Style over Substance - how OEMs are breaking Android security by Robert Miller; Reversing iOS Apps - a Practical Approach by Patrick Wardle; Darshak: how to turn your phone into a low cost IMSI catcher device by Ravishankar Borgaonkar and Swapnil Udar
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://2014.brucon.org/index.php/Schedule&quot;&gt;BruCON&lt;/a&gt; September 25-26 in Ghent, Belgium: Stealing a Mobile Identity Using Wormholes by Markus Vervier.
&lt;/ul&gt;

Links
&lt;ul&gt;
&lt;A href=&quot;http://www.theatlantic.com/business/archive/2014/08/the-harsh-polarizing-language-of-stolen-smartphones/379389/&quot;&gt;Smartphone Kill Switch == magic smoke&lt;/a&gt; This kill switch thing is likely more trouble then WIN. It will be interesting. &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/us-14/archives.html&quot;&gt;Black Hat USA 2014 slides&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.youtube.com/user/BlackHatOfficialYT/videos&quot;&gt;Black Hat USA 2014 talk recordings&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/jonarnes/status/501455238230863872&quot;&gt;Smartphone 20 years ago&lt;a/&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/SwiftOnSecurity/status/499572834570485760&quot;&gt;Linux Malware&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/thereaIbanksy/status/505423125203652610&quot;&gt;your phone owns you&lt;/a&gt; ... so true!&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://blog.disconnect.me/google-just-banned-our-new-android-app-before-it-even-launched-another-example-of-why-privacy-friendly-alternatives-for-android-app-distribution-are-critically-important&quot;&gt;Google bans Disconnect from Play Store&lt;/a&gt; While I like Disconnect a lot I can see that Google does not like it a bit. I would say it was expected to get banned.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
August so far was my busiest month of the year, so I guess I missed a lot of what was going on.</description>
 </item>
  <item>
 <title>Mobile Security News Update July 2014</title>
 <pubDate>Wed, 30 Jul 2014 18:43:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2014/07/30#mobile_security_news_update_july_2014</link>
 <description>
Not much to say about conferences in this post since in early August everybody will be in Las Vegas. I'll post an update after the
show is over.&lt;br&gt;&lt;br&gt;

The one thing I over read was the round tables that are going down at Black Hat. Specifically: EMBEDDED DEVICES ROUNDTABLE: EMBEDDING THE MODERN WORLD, WHERE DO WE GO FROM HERE? hosted by Don Bailey &amp; Zach Lanier, MOBILE SECURITY ROUNDTABLE: WHAT DOES MOBILE SECURITY LOOK LIKE TODAY? WHAT WILL IT LOOK LIKE TOMORROW? hosted by Vincenzo Iozzo &amp; Peiter Zatko and RESPONSIBLE DISCLOSURE ROUNDTABLE: YOU MAD BRO? hosted by Trey Ford look interesting.

&lt;br&gt;&lt;br&gt;

There was a lot of fuzz about iOS backdoors. I didn't have time to go into all details but the
basic facts seem to be that iOS has capabilities to exfiltrate data to paired computers.
The danger seems to lie in that fact that you can steal/copy the paring from a computer.
The initial slide deck from Jonathan Zdziarski are available &lt;a href=&quot;https://pentest.com/ios_backdoors_attack_points_surveillance_mechanisms.pdf&quot;&gt;here&lt;/a&gt;. There was a huge follow up discussion on twitter. Roundup from the Jonathan:
&lt;a href=&quot;http://www.zdziarski.com/blog/?p=3522&quot;&gt;1&lt;/a&gt; 
counter side from Violet Blue: &lt;a href=&quot;http://www.zdnet.com/the-apple-backdoor-that-wasnt-7000031781/&quot;&gt;2&lt;/a&gt;
also see Dino Dai Zovi's post: &lt;a href=&quot;http://ddz.roughdraft.io/b6879ba86fc7ddc2e26f-ios-lockdown-diagnostic-services&quot;&gt;3&lt;/a&gt;
&lt;br&gt;&lt;br&gt;

Links
&lt;ul&gt;
&lt;a href=&quot;http://press.blackberry.com/press/2014/blackberry-reinforces-mobile-security-leadership-with-acquisitio.html&quot;&gt;RIM buys SecuSmart&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://whispersystems.org/blog/signal/&quot;&gt;Signal / RedPhone / TextSecure&lt;/a&gt; for iOS and Android and it works really well.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://fuzion24.github.io/android/obfuscation/ndk/llvm/o-llvm/2014/07/27/android-obfuscation-o-llvm-ndk/&quot;&gt;Obfuscating Android Applications using O-LLVM and the NDK&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://www.silentservices.de/android-hushsms-v2-6-1-released/&quot;&gt;HushSMS for Android&lt;/a&gt; Now alerts you if you get unusual SMS. &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/kappuchino/status/494052162423758848&quot;&gt;Blackphone firmware image&lt;/a&gt; available for download, have fun.&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update June 2014</title>
 <pubDate>Tue, 24 Jun 2014 17:02:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2014/06/24#mobile_security_news_update_june2014</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;http://www.syscan360.org/en/speakers.html&quot;&gt;SyScan 360&lt;/a&gt; Play With an Unpublished Kernel Vulnerability for iOS 7.0.x by windknown and dm557; Be cautious, there is an attack window in your android app by pLL; Click and Dagger: Denial and Deception on Android Smartphones by The Grugq; Advanced Bootkit Techniques on Android by Chen Zhangqi and Shen Di; Mobile Browsers Security: iOS by Lukasz Pilor and Pawel Wylecial
&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;https://defcon.org/html/defcon-22/dc-22-speakers.html&quot;&gt;Defcon&lt;/a&gt; Detecting Bluetooth Surveillance Systems by Grant Bugher; Android Hacker Protection Level 0 by Tim Strazzere and Jon Sawyer; Shellcodes for ARM: Your Pills Don't Work on Me, x86 by Svetlana Gaivoronski and Ivan Petrov; Blowing up the Celly - Building Your Own SMS/MMS Fuzzer by Brian Gorenc and Matt Molinyawe; Burner Phone DDOS 2 dollars a day : 70 Calls a Minute by Weston Hecker; NSA Playset : GSM Sniffing by Pierce and Loki
&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;

So people are still building SMS and MMS fuzzers in 2014. I'm really interested to see what new techniques the ZDI guys came up with.
&lt;br&gt;&lt;br&gt;

Links
&lt;ul&gt;
&lt;a href=&quot;http://www.neowin.net/news/security-warning-mediatek-based-phones-could-be-facing-a-potential-security-hole&quot;&gt;Mediatek-based phone reset after receiving a text message containing a =&lt;/a&gt; WOW just WOW &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.f-secure.com/v-descs/cabir.shtml&quot;&gt;Cabir (first mobile phone virus) turns 10 years this month&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://towelroot.com/&quot;&gt;Towelroot&lt;/a&gt; Android root exploit that works on a wide range of current Android devices.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://theroot.ninja/&quot;&gt;HTC Bootloader Unlock / S-OFF&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://apcmag.com/android-runtime-how-it-works.htm&quot;&gt;Overview of Android's ART&lt;/a&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update May 2014</title>
 <pubDate>Thu, 29 May 2014 18:27:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2014/05/29#mobile_security_news_update_may2014</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;http://recon.cx/&quot;&gt;Recon&lt;/a&gt; A Bedtime Tale for Sleepless Nights: Josh &quot;m0nk&quot; Thomas and Nathan Keltner; The Making of the Kosher Phone: Assaf Nativ
&lt;br&gt;&lt;Br&gt;
&lt;a href=&quot;http://shakacon.org/&quot;&gt;Shakacon&lt;/a&gt;Researching Android Device Security with the Help of a Droid Army: Joshua Drake - Accuvant; Practical OpSec for Android Devices: The Grugq&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://toorcamp.toorcon.net/talks/&quot;&gt;ToorCamp&lt;/a&gt; Collin Mulliner: Hacking Android Apps with Dynamic Instrumentation
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/us-14/briefings.html&quot;&gt;Black Hat&lt;/a&gt; ABUSING PERFORMANCE OPTIMIZATION WEAKNESSES TO BYPASS ASLR: Byoungyoung Lee &amp;  Yeongjin Jang &amp;  Tielei Wang; ANDROID FAKEID VULNERABILITY WALKTHROUGH: Jeff Forristal; ATTACKING MOBILE BROADBAND MODEMS LIKE A CRIMINAL WOULD: Andreas Lindh; CELLULAR EXPLOITATION ON A GLOBAL SCALE: THE RISE AND FALL OF THE CONTROL PROTOCOL: Mathew Solnik &amp;  Marc Blanchou; IT JUST (NET)WORKS: THE TRUTH ABOUT IOS 7'S MULTIPEER CONNECTIVITY FRAMEWORK: Alban Diquet; MOBILE DEVICE MISMANAGEMENT: Stephen Breen; REFLECTIONS ON TRUSTING TRUSTZONE: Dan Rosenberg; RESEARCHING ANDROID DEVICE SECURITY WITH THE HELP OF A DROID ARMY: Joshua Drake; SIDEWINDER TARGETED ATTACK AGAINST ANDROID IN THE GOLDEN AGE OF AD LIBS: Tao Wei &amp;  Yulong Zhang; STATIC DETECTION AND AUTOMATIC EXPLOITATION OF INTENT MESSAGE VULNERABILITIES IN ANDROID APPLICATIONS: Daniele Gallingani; UNDERSTANDING IMSI PRIVACY: Ravishankar Borgaonkar &amp;  Swapnil Udar; UNWRAPPING THE TRUTH: ANALYSIS OF MOBILE APPLICATION WRAPPING SOLUTIONS: Ron Gutierrez &amp;  Stephen Komal 
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://defcon.org/html/defcon-22/dc-22-news.html&quot;&gt;Defcon&lt;/a&gt; NSA Playset - GSM Sniffing: Pierce and Loki; more upcoming but they are not listed yet.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
I'm really happy to see two talks accepted at Black Hat that investigate Mobile Device Management (MDM) systems and app wrapping
security solutions. This should be quite interesting since this is more or less the state of the art when it comes
to third-party mobile security applications.
&lt;br&gt;&lt;br&gt;
Links
&lt;ul&gt;
&lt;a href=&quot;http://newandroidbook.com/files/AnDevConD.pdf&quot;&gt;Linux &amp; Android Debugging native debugging techniques&lt;/a&gt; (PDF)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.scs.stanford.edu/~sorbo/brop/&quot;&gt;Blind Return Oriented Programming&lt;/a&gt; (checkout the slides, one of my favorite talks at IEEE S&amp;P 2014)&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
I've been super busy in the last weeks mostly work and travel and more traveling coming up in a few days. Summer will be
pretty awesome again. My talk on GUI security was accepted at Black Hat so did the talks of many of my friends. This
should be a pretty epic year. Also I'm finally making it out to ToorCamp. More updates after I return from ASIA CCS.</description>
 </item>
  <item>
 <title>Mobile Security News Update April 2014</title>
 <pubDate>Tue, 22 Apr 2014 19:38:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2014/04/22#mobile_security_news_updatea_april_2014</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://immunityinc.com/infiltrate/&quot;&gt;Infiltrate&lt;/a&gt; has Joshua J. Drake: Researching Android Device Security with the Help of a Droid Army&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://ieee-security.org/TC/SP2014/program.html&quot;&gt;IEEE Security and Privacy&lt;/a&gt; (academic) has a number of papers: Upgrading Your Android, Elevating My Malware: Privilege Escalation Through Mobile OS Updating; The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations; From Zygote to Morula: Fortifying Weakened ASLR on Android&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://recon.cx&quot;&gt;ReCon&lt;/a&gt; has The Making of the Kosher Phone by Assaf Nativ (CFP not complete yet)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://haxpo.nl/&quot;&gt;Hack in the Box Amsterdam&lt;/a&gt; has Shellcodes for ARM: Your Pills Don't Work on Me, x86; Exploring and Exploiting iOS Web Browsers; State of the ART: Exploring the New Android KitKat Runtime; On Her Majesty's Secret Service: GRX and a Spy Agency (&lt;b&gt;HITB folks fix your website, finding talks and speakers is sooo hard I almost do not bother to do it - worst conference website I know!!&lt;/b&gt;)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://asiaccs2014.nict.go.jp/programme.html&quot;&gt;ASIA CCS&lt;/a&gt; (academic) has a number of papers: Timothy Vidas, Nicolas Christin:
Evading Android Runtime Analysis via Sandbox Detection; Collin Mulliner, William Robertson, Engin Kirda: VirtualSwindle: An Automated Attack Against In-App Billing on Android; Min Zheng, Mingshen Sun, John C.S. Lui: DroidRay: A Security Evaluation System for Customized Android Firmwares;
Wenbo Yang, Juanru Li, Yuanyuan Zhang, Yong Li, Junliang Shu, Dawu Gu: APKLancet: Tumor Payload Diagnosis and Purification for Android Applications&lt;br&gt;
&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;
&lt;br&gt;
Heartbleed and Mobile 
&lt;ul&gt;
Heartbleed and Android [&lt;a href=&quot;http://arstechnica.com/security/2014/04/vicious-heartbleed-bug-bites-millions-of-android-phones-other-devices/&quot;&gt;1&lt;/a&gt;] I couldn't find any detailed discussion of Android itself or Android apps being vulnerable to the heartbleed attack. Sure some apps are linked against
vulnerable versions of OpenSSL but I couldn't find any attack description. If you know anything specific please email me!&lt;br&gt;&lt;br&gt;
&lt;br&lt;br&gt;
Checkout &lt;a href=&quot;https://reverseheartbleed.com/&quot;&gt;reverseheartbleed.com&lt;/a&gt; a heartbleed testing service for clients software (e.g., web browsers).&lt;br&gt;&lt;br&gt;
&lt;br&gt;
SMS bulk operators vulnerable to heartbleed, leak 2FA tokens see &lt;a href=&quot;http://www.heise.de/newsticker/meldung/Zugriff-auf-SMS-Nachrichten-und-Tor-Traffic-dank-Heartbleed-2172655.html&quot;&gt;heise.de&lt;/a&gt; (in German)&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
Links
&lt;ul&gt;
&lt;a href=&quot;http://www.theregister.co.uk/2014/04/16/samsung_s5_fingerprint_hacked/&quot;&gt;Samsung S5 fingerprint reader hacked&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://genode.org/documentation/articles/trustzone&quot;&gt;An Exploration of ARM TrustZone Technology&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;
Personal notes
&lt;ul&gt;
I'll be speaking at &lt;a href=&quot;http://www.meetup.com/Duo-Tech-Talks/&quot;&gt;Duo Tech Talks&lt;/a&gt; in Ann Abor, MI (this will be a IoT related talk).&lt;br&gt;&lt;br&gt;
I'm on a panel about Internet of Things security at &lt;a href=&quot;http://www.securityofthings.com/&quot;&gt;The Security of Things Forum&lt;/a&gt; in Cambridge, MA.&lt;br&gt;&lt;br&gt;
Mid-End of  May I'll spent some time in the Bay Area for IEEE S&amp;P, with plenty of time afterward to hangout.&lt;br&gt;&lt;br&gt;
I'm also planning to go to ToorCamp, who else is going?
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>TOR Bleed</title>
 <pubDate>Thu, 17 Apr 2014 12:29:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2014/04/17#torbleed</link>
 <description>
Update 2:
&lt;ul&gt;
I scanned Tor starting Friday April 11th and ended Sunday April 13th. I stopped cause I got enough evidence on leaked plain text.
I wasn't sure what to do with the data so I was sitting on it for a couple of days but than decided to just blog about it.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
Update:
&lt;ul&gt;
Tor doesn't have too many exitnodes, the nodes I was testing are Tor nodes in general not only exitnodes. Never the less I found
a number of vulnerable exitnodes that leak plain text data. &lt;br&gt;&lt;br&gt;
The Tor Project has started to &lt;a href=&quot;https://lists.torproject.org/pipermail/tor-relays/2014-April/004336.html&quot;&gt;black list vulnerable nodes&lt;/a&gt;.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;

Tuesday April 7th I started my own investigations of the &lt;a href=&quot;http://heartbleed.com&quot;&gt;Heartbleed&lt;/a&gt; issue. In this blog post I want
to talk about one of the things I've been looking into that is the effect heartbleed has on &lt;a href=&quot;https://www.torproject.org/&quot;&gt;TOR&lt;/a&gt;.
TOR heavily uses SSL to encrypt traffic between the various TOR nodes. TOR was obviously vulnerable as &lt;a href=&quot;https://blog.torproject.org/blog/openssl-bug-cve-2014-0160&quot;&gt;reported&lt;/a&gt; by the TOR project.
&lt;br&gt;&lt;br&gt;
For my investigation I pulled a list of about 5000 TOR nodes using &lt;a href=&quot;https://www.dan.me.uk/tornodes&quot;&gt;dan.me.uk&lt;/A&gt;. Using one of the many proof-of-concept
exploits I scanned the TOR nodes to determine if they are vulnerable. &lt;b&gt;I found 1045 of the 5000 nodes to be vulnerable to the heartbleed bug, that is about 20%.&lt;/b&gt;
&lt;br&gt;&lt;br&gt;
I briefly checked the leaked memory to determine if plain text is leaked that is related to TOR user traffic. &lt;b&gt;Yes, TOR exitnodes that are vulnerable to heartbleed
leak plain text user traffic.&lt;/b&gt; You can find anything ranging from hostnames, downloaded web content, to session IDs, etc.
&lt;br&gt;&lt;br&gt;
The majority of the vulnerable TOR nodes are located in Germany, Russia, France, Netherlands, United Kingdom, and Japan. The TOR network has more than
5000 nodes so this is not a complete picture but it provides a good overview of the possible number of vulnerable exitnodes.
&lt;br&gt;&lt;br&gt;
The heartbleed bug basically allows any one to obtain traffic coming in and out of TOR exitnodes (given that the actual connection that is run over TOR is
not encrypted itself). Of course a malicious party could run a TOR exitnode and inspect all the traffic that passes thru it, but this requires
running a TOR node in the first place. Using the heartbleed bug anyone can query vulnerable exitnodes to obtain TOR exit traffic.
&lt;br&gt;&lt;br&gt;
There are a number of possible solutions for this problem. 1) update vulnerable TOR nodes (hopefully in progress), 2) create a blacklist of vulnerable TOR nodes and
avoid them, 3) stop using TOR until all nodes are updated. 
&lt;br&gt;&lt;br&gt;
Further Steps:
&lt;ul&gt;
Scan all TOR exitnodes to create a black list of vulnerable nodes so users can avoid them.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
Notes:
&lt;ul&gt;
One interesting thing I found is the large number of requests that seem to be originating from malware due to the domain names looking like the output of a DGA.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
Links:
&lt;ul&gt;
&lt;a href=&quot;&quot;http://heartbleed.com&quot;&gt;Heartbleed&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html&quot;&gt;Heartbleed disclosure timeline: who knew what and when&lt;/a&gt;&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Android Hardening Tools</title>
 <pubDate>Wed, 26 Mar 2014 16:00:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2014/03/26#Android_hardening_tools</link>
 <description>
A few weeks ago I upgraded from a Galaxy Nexus to a Nexus 5. I therefore took the chance
and investigated lightweight and &lt;b&gt;practical&lt;/b&gt; device hardening tools. 
I didn't have anything specific in mind I just wanted to improve my overall situation.
Here is what I came up with.
&lt;br&gt;&lt;br&gt;
&lt;b&gt;Basics:&lt;/b&gt;
&lt;ul&gt;
File system encryption, of course, using the build-in functionality of Android. 
To improve the security and usability I use &lt;a href=&quot;https://play.google.com/store/apps/details?id=org.nick.cryptfs.passwdmanager&quot;&gt;Cyrptfs Password&lt;/a&gt; to
have a separate passphrase for the file system encryption and the screen lock. This tool requires root.
&lt;br&gt;&lt;br&gt;
Encrypted SMS and messaging using &lt;a href=&quot;https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms&quot;&gt;TextSecure&lt;/a&gt;. The application
is very user friendly and a nice replacement for Google Hangout.
&lt;/ul&gt;
&lt;br&gt;
&lt;b&gt;Network:&lt;/b&gt;
&lt;ul&gt;
I started using &lt;a href=&quot;https://play.google.com/store/apps/details?id=org.sshtunnel&quot;&gt;SSHTunnel&lt;/a&gt; and &lt;a href=&quot;https://play.google.com/store/apps/details?id=org.proxydroid&quot;&gt;ProxyDroid&lt;/a&gt;
to secure network traffic while traveling. In combination both tools provide the ability to tunnel all network traffic of your device through any box you have a SSH access on.
Both apps require root.
&lt;br&gt;&lt;br&gt;
I'm trying out &lt;a href=&quot;https://play.google.com/store/apps/details?id=eu.chainfire.pryfi&quot;&gt;Pry-fi&lt;/a&gt; a Wifi privacy tool.
&lt;/ul&gt;
&lt;br&gt;
&lt;b&gt;App Security:&lt;/b&gt;
&lt;ul&gt;
This category is a little hard to describe. I was looking for an app to vet APK, but without using any AV software. I found &lt;a href=&quot;https://play.google.com/store/apps/details?id=net.rehacktive.checksum&quot;&gt;Checksum&lt;/a&gt;,
this app calculates a checksum for each APK and compares it with a global repository that is feed with checksums from other users. 
&lt;br&gt;&lt;br&gt;
I further using my own tool &lt;a href=&quot;https://play.google.com/store/apps/details?id=org.mulliner.telstop&quot;&gt;TelStop&lt;/a&gt; to inspect TEL Uri to determine if the contain MMI codes. 
&lt;br&gt;&lt;br&gt;
If I was using an older Android device I would also install: &lt;a href=&quot;https://play.google.com/store/apps/details?id=io.rekey.rekey&quot;&gt;ReKey&lt;/a&gt; to patch Master Key and &lt;a href=&quot;http://www.xray.io/#download&quot;&gt;X-Ray&lt;/a&gt; to
scan for vulnerabilities.
&lt;/ul&gt;
&lt;br&gt;
&lt;b&gt;Rooting:&lt;/b&gt;
&lt;ul&gt;
Many of the hardening apps I use require root access. Rooting is a tricky business and you should only do it if you know what you are getting into. 
If you want to encrypt and root, first root then encrypt. Rooting a Nexus device is straightforward, unlock the bootloader, install su + superSU. 
One thing todo is install a recovery image that can handle encrypted file systems like TWRP. A decent guide is posted &lt;a href=&quot;http://forum.xda-developers.com/showthread.php?t=2507905&quot;&gt;here&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
You should also consider re-locking your bootloader after rooting, see &lt;a href=&quot;http://android.stackexchange.com/questions/36830/whats-the-security-implication-of-having-an-unlocked-boot-loader&quot;&gt;What's the security implication of having an unlocked boot loader?&lt;/a&gt;.
This is a lot of work and pretty painful when installing firmware patches, but you likely don't want to run around with a unlocked bootloader.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
All together I'm pretty happy with this limited set of security applications. If you think I'm missing something important please let me know.</description>
 </item>
  <item>
 <title>Mobile Security News Update March 2014</title>
 <pubDate>Mon, 03 Mar 2014 19:04:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2014/03/03#mobile_security_news_update_march_2014</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;http://2014.infosecsouthwest.com/lectures.html&quot;&gt;InfoSecSouthWest&lt;/a&gt; April 4-6 Austin Texas. jduck: Android Security Research and Testing at Scale. Thomas Wang: Breaking through the bottleneck: Mobile malware is outbreak spreading like wildfire.
&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;

CFPs
&lt;ul&gt;
&lt;a href=&quot;https://www.sec-t.org/2014/cfp.html&quot;&gt;SEC-T&lt;/a&gt; Stockholm, Sweden!&lt;br&gt;
&lt;a href=&quot;http://masshackers.pbworks.com/w/page/61663884/BeaCon&quot;&gt;BeaCon&lt;/a&gt; Boston, MA (very small con)&lt;br&gt;
&lt;a href=&quot;http://44con.com/cfp2014/&quot;&gt;44con&lt;/a&gt; London, UK&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;
TextSecure: secure and easy to use text (SMS) for Android (and soon iOS)
&lt;ul&gt;
I'm not really into advertising for stuff here but the recent update of
&lt;a href=&quot;https://whispersystems.org/&quot;&gt;TextSecure&lt;/a&gt; made a gigantic impression on me. The application works well, is uber user friendly, and looks just great.
They further added IM like functionality (using IP rather then SMS), see here: &lt;a href=&quot;https://whispersystems.org/blog/the-new-textsecure/&quot;&gt;The New TextSecure: Privacy Beyond SMS&lt;/a&gt;. Further there is the possibility to run your own
&lt;i&gt;server&lt;/i&gt; for TextSecure IP backend, see &lt;a href=&quot;https://twitter.com/collinrm/status/438029490300936192&quot;&gt;here&lt;/a&gt;.&lt;br&gt;&lt;br&gt;
I switched to TextSecure for a number of reasons: transparent encrypted SMS, super usable application (I can finally stop using the Hangout app - worst thing so far on my Nexus 5), TextSecure source code is available, and did I mention that the UI looks really great? All in all this is good quality security software that even looks better then the less secure competitors, YES!
&lt;/ul&gt; 
&lt;br&gt;&lt;br&gt;
WebViews and Security on Android
&lt;ul&gt;
The security (insecurity) of &lt;a href=&quot;http://developer.android.com/reference/android/webkit/WebView.html&quot;&gt;WebView&lt;/a&gt; lately got a lot of attention.
There has been some early academic work such as &lt;a href=&quot;https://www.iseclab.org/papers/webview_leet13.pdf&quot;&gt;A View to A Kill: WebView Exploitation&lt;/a&gt; by Matthias Neugschwandtner et al. Then there was &lt;a href=&quot;https://www.mwrinfosecurity.com/articles/ad-network-research/&quot;&gt; Dave Hartley's&lt;/a&gt; blog post on ad-network security. Most recently Joshua 'jduck' Drake wrote a &lt;a href=&quot;http://www.droidsec.org/news/2014/02/26/on-the-webview-addjsif-saga.html&quot;&gt;very detailed blog post&lt;/a&gt; about the &lt;i&gt;WebView addJavaScriptInterface Saga&lt;/i&gt;. All in all the WebView story is not over for sure as WebViews are a widely used framework feature of Android. I'll keep following this issue for sure.
&lt;/ul&gt;
&lt;br&gt;
Links
&lt;ul&gt;
&lt;a href=&quot;http://www.youtube.com/user/TrustyCon&quot;&gt;TrustyCon&lt;/a&gt; recordings&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.imperialviolet.org/2014/02/22/applebug.html?utm_source=twitterfeed&amp;utm_medium=twitter&quot;&gt;Apple's SSL/TLS Bug&lt;/a&gt; by Adam Langley, best write up I found so far.&lt;br&gt;
&lt;a href=&quot;http://www.cs.cuhk.hk/~cslui/PUBLICATION/ASIACCS2014DROIDRAY.pdf&quot;&gt;DroidRay: A security evaluation system for customized android firmwares&lt;/a&gt; an academic paper.&lt;br&gt;
&lt;a href=&quot;http://tsyrklevich.net/2014/02/09/android-oems-exposing-touchscreen-input/&quot;&gt;Android OEMs exposing touchscreen input&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;https://twitter.com/TeamAndIRC/status/440206328045125632&quot;&gt;Android platform fragmentation fragmentation inside HTC, ETOOMANYBROADCASTS&lt;/a&gt;&lt;br&gt;
&lt;/ul&gt;
</description>
 </item>
  <item>
 <title>Mobile Security News Update for February 2014</title>
 <pubDate>Sat, 25 Jan 2014 21:19:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2014/01/25#mobile_security_news_Feb2014</link>
 <description>
This is an early update for February. Two reasons, I have stuff to write
about right now, second I'm going to be super busy in February.&lt;br&gt;&lt;br&gt;
This year I attended ShmooCon for the first time. I liked it a lot and plan
to go again. I didn't know ShmooCon was running for 10 years already. They
seem to have a good grip on the conference and don't let it explode in size.
&lt;br&gt;&lt;br&gt;
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://cansecwest.com/agenda.html&quot;&gt;CanSecWest&lt;/a&gt; one of my favorite cons (maybe my #1). Talks: No Apology Required: Deconstructing Blackberry10 - Zach Lanier, Ben Nei ; Duo Security &amp; Accuvant. Outsmarting Bluetooth Smart - Mike Ryan ; iSEC Partners. The Real Deal of Android Device Security: the Third Party - Colin Mulliner, Jon Oberheide ; Northwestern University, Duo Security.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.troopers.de/troopers14/index.html&quot;&gt;Troopers&lt;/a&gt; (Heidelberg, Germany). There is one mobile talk in the main conference but there in addition they have TelSecDay (invite only) that focuses on Telecommunication security. The main conference talk is: Modern smartphone forensics: Apple iOS: from logical and physical acquisition to iCloud backups, document storage and keychain; encrypted BlackBerry backups (BB 10 and Olympia Service)
by Vladimir Katalov.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://nullcon.net/website/goa-14/schedule.php#conference&quot;&gt;nullcon&lt;/a&gt; (Goa, India) has a mobile talk this year: Modern smartphone forensics: Apple iCloud, encrypted BlackBerry backups, Windows Phone 8 cloud backup - by Vladimir Katalov. 
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.syscan.org/index.php/sg/speakers&quot;&gt;SyScan&lt;/a&gt; 2014 looks super awesome this year.  Josh &quot;Monk&quot; Thomas : &quot;How to train your Snapdragon: Exploring Power Regulation Frameworks on Android&quot;. Dr Thaddeus (The) Grugq : &quot;Click and Dragger: Denial and Deception on Android Smartphones&quot;. Alex Plaskett &amp; Nick Walker &quot;Navigating a sea of Pwn? : Windows Phone 8 AppSec&quot;. 
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/asia-14/briefings.html&quot;&gt;Black Hat Asia&lt;/a&gt; THE INNER WORKINGS OF MOBILE CROSS-PLATFORM TECHNOLOGIES by Simon Roses Femerling. 
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://haxpo.nl/hitb2014ams-conference/#speakers&quot;&gt;HITB Amsterdam&lt;/a&gt; Shellcodes for ARM: Your Pills Don't Work on Me, x86 by SVETLANA GAIVORONSKI and  IVAN PETROV.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.rootedcon.es/index.php/new-round-of-confirmed-speakers-for-rooted-con-2014/?lang=en&quot;&gt;RootedCON&lt;/a&gt; (Spain) talks: Raul Siles - iOS: Regreso al futuro, Pau Oliva - Bypassing wifi pay-walls with Android. Some talks look like they are mobile talks too :) (my Spanish is kinda bad) 
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;

Links
&lt;ul&gt;
&lt;a href=&quot;https://github.com/iSECPartners/ios-ssl-kill-switch&quot;&gt;iOS SSL kill switch&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blogs.360.cn/360mobile/2014/01/17/oldboot-the-first-bootkit-on-android/&quot;&gt;Oldboot: the first bootkit on Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://packetstormsecurity.com/files/124581/Android-ARM-Elf-Infector-Proof-Of-Concept.html&quot;&gt;Android/ARM Elf Infector Proof Of Concept&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.reddit.com/r/jailbreak/comments/1ut50c/germany_onlyget_as_many_big_macs_as_you_like_for/&quot;&gt;[GERMANY ONLY]Get as many Big Macs as you like for free thanks to JB&lt;/a&gt; (lol)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.androidpolice.com/2014/01/24/the-google-play-store-app-has-a-hidden-debug-menu-and-heres-how-rooted-users-can-access-it/&quot;&gt;The Google Play Store App Has A Hidden Debug Menu, And Here's How Rooted Users Can Access It&lt;/a&gt;&lt;br&gt; (somebody should write a hack to get this using my DDI tools so you don't have to install Xposed).&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://gist.github.com/hubert3/8560499&quot;&gt;Python implementation of passcode hashing algorithm used on the Samsung Galaxy S4 GT-I9505 4.2.2&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://m.androidauthority.com/vpn-vulnerability-337330/&quot;&gt;Android vulnerability allows data to be stolen from VPN connections&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://cs.ucsb.edu/~yanick/publications/2014_ndss_android-remote-code-execution.pdf&quot;&gt;Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications&lt;/a&gt; an academic paper. I was also briefly looking into dynamic code loading that a number of android apps are doing.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://bluebox.com/corporate-blog/android-emulator-detection/&quot;&gt;Android Emulator Detection by Observing Low-level Caching Behavior&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
There are a lot of interesting talks in the next month. I'm working on (and finished) some interesting projects that I can hopefully talk about soon.&lt;br&gt;&lt;br&gt;
Our &lt;a href=&quot;http://www.amazon.com/Android-Hackers-Handbook-Joshua-Drake/dp/111860864X/&quot;&gt;Android book&lt;/a&gt; is finalized and thus should be available in April.&lt;br&gt;&lt;br&gt;
The Defcon CFP is already open so make sure you submit your talks early. Also checkout &lt;A href=&quot;http://area41.io/&quot;&gt;Area 41&lt;/a&gt; a fine security conference in Switzerland, the CFP is still open.&lt;br&gt;&lt;br&gt;

This year I'm co-chairing &lt;a href=&quot;http://www.ares-conference.eu/conf/&quot;&gt;ARES&lt;/a&gt; an academic security conference. Please consider submitting your papers.
&lt;br&gt;&lt;br&gt;
If you are interested in NFC (Near Field Communication) check out the current draft of the &lt;a href=&quot;http://www.w3.org/TR/2014/WD-nfc-20140114/&quot;&gt;Web NFC API&lt;/a&gt;. The standard defines how a &quot;web page&quot; can interact with NFC devices.</description>
 </item>
  <item>
 <title>Mobile Security News Update January 2014</title>
 <pubDate>Sun, 05 Jan 2014 18:21:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2014/01/05#mobile_security_news_jan2014</link>
 <description>
&lt;a href=&quot;https://events.ccc.de/congress/2013/wiki/Main_Page&quot;&gt;30C3&lt;/a&gt; was 
awesome. A lot of good talks, many friendly people, and an awesome location.
The recordings of all talks can be found &lt;a href=&quot;https://events.ccc.de/congress/2013/wiki/Static:Documentation#Recordings&quot;&gt;here&lt;/a&gt;.&lt;br&gt;&lt;br&gt;

The slides and source for my talk Android DDI are available here: &lt;a href=&quot;http://www.mulliner.org/android/feed/mulliner_ddi_30c3.pdf&quot;&gt;slides&lt;/a&gt; and &lt;a href=&quot;http://github.com/crmulliner/ddi&quot;&gt;source&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
I was super busy so I guess I missed a lot that was going on in the 2nd half of December. I will start posting stuff again later this month.
&lt;br&gt;&lt;br&gt;
I'm going to ShmooCon in mid January and to Troopers in March.
&lt;br&gt;&lt;br&gt;
&lt;br&gt;
Advertisement: If you are a computer science student and are interested in security and want to spent some time in the US, please contact me. I'm always looking for motivated people to do research with.</description>
 </item>
  <item>
 <title>Mobile Security News Update November 2013</title>
 <pubDate>Thu, 21 Nov 2013 18:57:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2013/11/21#mobile_security_news_update_nov2013</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://events.ccc.de/2013/11/16/the-30c3-security-track/&quot;&gt;30c3&lt;/a&gt; did not announce the program yet but I know a bunch of people who got their talks accepted. It is going to be a good conference. I will talk about my Dynamic Dalvik Instrumentation framework for Android (more about this soon).
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.shmoocon.org/speakers_2013&quot;&gt;ShmooCon&lt;/a&gt; has announced a number of talks. Armor For Your Android Apps by  Roman Faynberg, Apple iOS Certificate Tomfoolery by Tim Medin, How Smart Is Bluetooth Smart? by Mike Ryan, Protecting Sensitive Information on iOS Devices by David Schuetz
&lt;/ul&gt;
&lt;br&gt;
&lt;br&gt;
News and Links
&lt;ul&gt;
&lt;a href=&quot;https://labs.mwrinfosecurity.com/blog/2013/11/20/applovin-ad-library-sdk-remote-command-execution-via-update-mechanism/&quot;&gt;Bugs in Mobile Ad Libraries&lt;/a&gt;&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://seclists.org/bugtraq/2013/Nov/55&quot;&gt;LastPass Android container PIN and auto-wipe security feature bypass (CVE-2013-5113/5114)&lt;/a&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;
I bet I missed a lot of stuff that happened in the last weeks.&lt;br&gt;&lt;br&gt;

I'm going to be at 30c3 in Hamburg, Germany between Christmas an New Years.</description>
 </item>
  <item>
 <title>Mobile Security News Update October 2013</title>
 <pubDate>Fri, 11 Oct 2013 16:06:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2013/10/11#mobile_security_news_update_oct_2013</link>
 <description>
September was a busy month, but the monthly update is back!&lt;br&gt;&lt;br&gt;

Conferences
&lt;ul&gt;
&lt;a href=&quot;http://2013.hack.lu/index.php/Agenda&quot;&gt;HACK.LU&lt;/a&gt; Debugging and Reversing the HTC Android Bootloader by Cedric Halbronn and Nicolas Hureau, Grand Theft Android: Phishing with permission by Joany Boutet and Tom Leclerc, Abusing Dalvik Beyond Recognition by Jurriaan Bremer, Playing Hide and Seek with Dalvik executables by Axelle Apvrille. So Hack.Lu has a lot of Android talks this year, but most of the other talks look super interesting too. I would love to go, but can't.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://pacsec.jp/speakers.html&quot;&gt;PacSec&lt;/a&gt; Tokyo, November 2013. &quot;Android games + free Wi-Fi = Privacy leak&quot; Takayuki Sugiura &amp; Yosuke Hasegawa, NetAgent, @hasegawayosuke, &quot;Defeating the protection mechanism on Android platform&quot;
Tim Xia, Baidu, &quot;Mobile Phone Baseband Exploitation in 2013: Hexagon challenges&quot;
Dr. Ralf-Philipp Weinmann, Affiliation, @esizkur, &quot;Deeper than ever before: Exploring, Subverting, Breaking and Pivoting with NAND Flash Memory&quot;
Josh m0nk Thomas. The PacSec program kicks ass!
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
Missed conferences: &lt;a href=&quot;http://www.ekoparty.org/speakers-2013.php?l=en&quot;&gt;ekopart 2013&lt;/a&gt; they had a bunch of mobile (mostly Android) talks.
&lt;br&gt;&lt;br&gt;
Links
&lt;ul&gt;
Samsung region-locking &lt;a href=&quot;http://gigaom.com/2013/09/27/samsung-region-locks-for-our-galaxy-smartphones-only-apply-the-first-time-you-insert-the-sim/&quot;&gt;1&lt;/a&gt; 
&lt;a href=&quot;http://www.androidpolice.com/2013/09/26/samsung-has-begun-sim-locking-its-phones-across-the-world-to-home-regions-putting-the-squeeze-on-phone-importers/&quot;&gt;2&lt;/a&gt;
&lt;a href=&quot;http://androidfannetwork.com/2013/10/02/the-lies-of-samsunggalaxy-note-3-is-infact-region-locked/&quot;&gt;3&lt;/a&gt;
This will keep me from buying Samsung phones in the future.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.zdnet.com/nokia-announces-its-killing-support-for-symbian-meego-apps-two-years-early-7000021739/&quot;&gt;Nokia announces it's killing support for Symbian, MeeGo apps two years early&lt;/a&gt;. To some extend I think 'wow this was fast' on the other side I was thinking 'wow they still spent money on the Symbian app store'. Symbian was great and a pain to write apps for - it will be missed.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://docs.google.com/presentation/d/1YDYUrD22Xq12nKkhBfwoJBfw2Q-OReMr0BrDfHyfyPw/pub?start=false&amp;loop=false&amp;delayms=3000&amp;utm_content=bufferdf909&amp;utm_source=buffer&amp;utm_medium=twitter&amp;utm_campaign=Buffer#slide=id.g1202bd8e5_05&quot;&gt;Android malware threat is vastly exaggerated&lt;/a&gt; slides by the Android Security Team.
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update September 2013</title>
 <pubDate>Fri, 30 Aug 2013 16:25:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2013/08/30#mobile_security_news_update_sep_2013</link>
 <description>
Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://deepsec.net/schedule.html&quot;&gt;DeepSec&lt;/A&gt; Cracking And Analyzing Apple iCloud Protocols: iCloud Backups, Find My iPhone, Document Storage:
Vladimir Katalov (ElcomSoft Co. Ltd.), Bypassing Security Controls with Mobile Devices: Georgia Weidman (Bulb Security LLC), Using memory, filesystems, and runtime to app pen iOS and Android: Andre Gironda, Mobile Fail: Cracking Open &quot;Secure&quot; Android Containers: Chris John Riley (c22.cc), Building the first Android IDS on Network Level: Jaime Sánche&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://conference.hitb.org/hitbsecconf2013kul/event/conference/&quot;&gt;Hack in the Box - Kuala Lumpur&lt;/a&gt; Tales from iOS 6 Exploitation and iOS 7 Security Changes: Stefan Esser, Cracking and Analyzing Apple's iCloud Protocols: Vladimir Katalov, Android DDI: Dynamic Dalvik Instrumentation of Android Applications and Framework: Collin Mulliner&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://ruxconbreakpoint.com/speakers/&quot;&gt;BreackPoint Ruxcon&lt;/a&gt; A TALE OF TWO ANDROIDS: Jon Oberheide, ADVANCED IOS KERNEL DEBUGGING FOR EXPLOIT DEVELOPERS: Stefan Esser&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://2013.brucon.org/index.php/Schedule&quot;&gt;BruCON&lt;/a&gt; Jake Valletta - CobraDroid, David Perez/Jose Pico - Geolocation of GSM mobile devices, even if they do not want to be found., Stephan Chenette - Building Custom Android Malware for Penetration Testing&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.h2hc.org.br/h2hc/pt/agenda&quot;&gt;Hackers2Hackers&lt;/a&gt; Android: Game of Obfuscation: Bremer &amp; Chiossi,   At ARMs length yet so far away: Brad Spengler&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;

Links:
&lt;ul&gt;
&lt;a href=&quot;https://github.com/poliva/dexinfo&quot;&gt;A very rudimentary Android DEX file parser&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;https://www.owasp.org/images/c/ca/ASDC12-An_InDepth_Introduction_to_the_Android_Permissions_Modeland_How_to_Secure_MultiComponent_Applications.pdf&quot;&gt;An In-Depth Introduction to  the Android Permission Model&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://darm.re/&quot;&gt;darm - Efficient ARMv7 Disassembler&lt;/a&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;

Android PRNG Stuff:
&lt;ul&gt;
So I guess everybody knows about the Android PRNG issue. See
&lt;a href=&quot;http://android-developers.blogspot.com/2013/08/some-securerandom-thoughts.html&quot;&gt;Some SecureRandom Thoughts&lt;/a&gt;
&lt;a href=&quot;http://arstechnica.com/security/2013/08/google-confirms-critical-android-crypto-flaw-used-in-5700-bitcoin-heist/&quot;&gt;Google confirms critical Android crypto flaw used in $5,700 Bitcoin heist&lt;/a&gt;
&lt;a href=&quot;http://emboss.github.io/blog/2013/08/21/openssl-prng-is-not-really-fork-safe/&quot;&gt;OpenSSL PRNG Is Not Really Fork-safe&lt;/a&gt;

Upcoming paper at CCS'13: Soo Hyeon Kim (The Attached Institute of ETRI and KOREA Unisversity), Daewan Han (The Attached Institute of ETRI), Dong Hoon Lee (KOREA University) &lt;i&gt;Predictability of Android OpenSSL's Pseudo Random Number Generator&lt;/i&gt; (those guys also got credited with reporting some issues about Android's OpenSSL PRNG usage). So they know about this for some time since the submission deadline for CCS was early in May. I wonder if the bitcoin heist could have been avoided if they notified the devs of the Android bitcoin wallet apps instead of Google.
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update August 2013</title>
 <pubDate>Mon, 12 Aug 2013 21:14:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2013/08/12#mobile_security_news_update_august13</link>
 <description>
Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://syscan360.org/html/2013/en/speakers.html&quot;&gt;SyScan 360&lt;/a&gt; Tales from iOS 6 Exploitation and iOS 7 Security Changes by Stefan Esser; Mr. Big-dumb or Mr. Big-data: How smart is your mobile security intelligent system by Wayne Yan; Android Forensic Analysis Deep Dive by Bradley Schatz; Detecting Advanced Android Malware by Data Flow Analysis Engine by pLL and Zu Hao
&lt;br&gt;&lt;br&gt;
HITB does not have a program yet.
&lt;/ul&gt;

I'm going to speak at &lt;a href=&quot;http://conference.hitb.org/hitbsecconf2013kul/&quot;&gt;HITB&lt;/a&gt; in Kuala Lumpur in October. My talk will be about Dynamic Dalvik Instrumentation. I will release all my code after the talk.
&lt;br&gt;&lt;br&gt;

CfP
&lt;ul&gt;
&lt;a href=&quot;https://frab.cccv.de/en/30C3/cfp&quot;&gt;30c3&lt;/a&gt; in Hamburg Germany (awesome location!)
&lt;/ul&gt;

&lt;br&gt;&lt;br&gt;

Black Hat USA slides are available &lt;a href=&quot;https://www.blackhat.com/us-13/archives.html&quot;&gt;here&lt;/a&gt;.&lt;br&gt;&lt;br&gt;


News
&lt;ul&gt;
&lt;a href=&quot;http://bitcoin.org/en/alert/2013-08-11-android&quot;&gt;Android secure random numbers are not random enough&lt;/a&gt; (bitcoin hack)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://threatpost.com/new-attack-leverages-mobile-ad-network-to-deliver-android-malware/&quot;&gt;Android malware via ad network&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://money.cnn.com/2013/08/12/news/companies/blackberry-sale/index.html?hpt=hp_t2&amp;utm_content=bufferbdb9e&amp;utm_source=buffer&amp;utm_medium=twitter&amp;utm_campaign=Buffer&quot;&gt;BlackBerry explores a sale of the company&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://haxit.blogspot.com.au/2013/08/hacking-transcend-wifi-sd-cards.html&quot;&gt;Hacking Transcend WiFi SD Cards&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://qz.com/112873/this-recycling-bin-is-following-you/&quot;&gt;This recycling bin is following you&lt;/A&gt;
&lt;/ul&gt;

&lt;br&gt;&lt;br&gt;
Make sure to check out the first release of &lt;a href=&quot;https://twitter.com/travisgoodspeed/status/365031148386123776&quot;&gt;POC||GTFO&lt;/a&gt;</description>
 </item>
  <item>
 <title>ReKey</title>
 <pubDate>Tue, 16 Jul 2013 10:18:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2013/07/16#rekey</link>
 <description>
today we finally release &lt;a href=&quot;http://www.rekey.io&quot;&gt;ReKey&lt;/a&gt; our hotpatching
service for fixing Android's &lt;i&gt;Master Key&lt;/i&gt; bug. We have a press release &lt;a href=&quot;https://www.duosecurity.com/press-releases/northeastern-university-and-duo-security-collaborate&quot;&gt;here&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
ReKey was joint work of: Collin Mulliner, Jon Oberheide, William Robertson, and Engin Kirda.
&lt;br&gt;&lt;br&gt;
more soon!</description>
 </item>
  <item>
 <title>Mobile Security News Update June 2013 part 2</title>
 <pubDate>Tue, 25 Jun 2013 19:59:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2013/06/25#mobile_security_news_update_june2013_2</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;http://defcon.org/html/defcon-21/dc-21-speakers.html&quot;&gt;Defcon&lt;/a&gt; has more talks: Do-It-Yourself Cellular IDS
&lt;/ul&gt;

CfP
&lt;ul&gt;
&lt;a href=&quot;http://www.sec-t.org/2013/cfp.html&quot;&gt;SEC-T&lt;/a&gt; in Stockholm, Sweden. I highly recommend submitting.
&lt;br&gt;
&lt;a href=&quot;http://syscan360.org/html/2013/en/topic.html&quot;&gt;SyScan360&lt;/a&gt; SyScan is always a lot fun.
&lt;bR&gt;
&lt;a href=&quot;http://cfp.hackinthebox.org/&quot;&gt;Hack in the Box&lt;/a&gt; (I submitted).
&lt;/ul&gt;
&lt;br&gt;
Here my &lt;a href=&quot;http://www.recon.cx/&quot;&gt;REcon&lt;/a&gt; review. I must say REcon 
became my favorite conference together with &lt;a href=&quot;http://www.cansecwest.com&quot;&gt;CanSecWest&lt;/a&gt;. There were to bunch of really cool talks. I always enjoy
REcon talks out side of my main work area. One such talk was about old video game cabinet security: &lt;a href=&quot;http://recon.cx/2013/schedule/events/43.html&quot;&gt; Just keep trying ! Unorthodox ways to hack an old-school hardware&lt;/a&gt;. I didn't find the link to the slides anymore. But pretty much 90% of the talks were good. REcon also had mobile talks. jduck's talk on &lt;i&gt;Reversing and Auditing Android's Proprietary Bits&lt;/i&gt; was pretty good. I especially liked &lt;i&gt;Wardriving from your pocket: Reversing the Broadcom chipset with Wireshark&lt;/i&gt; the talk was about reversing the Broadcom Wifi firmware to enable monitor mode. Their website is here: &lt;a href=&quot;http://bcmon.blogspot.com/&quot;&gt;bcmon.blogspot.com&lt;/a&gt;. Super interesting as well was &lt;i&gt;Hiding @ Depth Exploring &amp; Subverting NAND Flash memory&lt;/i&gt; and &lt;i&gt;Reversing HLR, HSS and SPR: rooting the heart of the Network and Mobile cores from Huawei to Ericsson&lt;/i&gt;. Altogether if you missed REcon you missed out!
&lt;br&gt;&lt;br&gt;
Links
&lt;ul&gt;
&lt;a href=&quot;http://forum.xda-developers.com/forumdisplay.php?f=2366&quot;&gt;XDA-Developers&lt;/a&gt; now has a security forum. First post is on vendor security contacts.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://bluebox.com/wp-content/uploads/2013/05/AndroidREnDefenses201305.pdf&quot;&gt;Slides on: Android Reversing and Defense&lt;/a&gt;
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
I actually decided to go to Defcon after all.</description>
 </item>
  <item>
 <title>Mobile Security News Update June 2013</title>
 <pubDate>Wed, 12 Jun 2013 18:29:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2013/06/12#mobile_security_news_update_june2013</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;https://www.blackhat.com/us-13/briefings.html&quot;&gt;Black Hat USA&lt;/a&gt; has
the following talks: A PRACTICAL ATTACK AGAINST MDM SOLUTIONS, ANDROID: ONE ROOT TO OWN THEM ALL, BLACKBERRYOS 10 FROM A SECURITY PERSPECTIVE, HIDING @ DEPTH - EXPLORING: SUBVERTING AND BREAKING NAND FLASH MEMORY, HOW TO BUILD A SPYPHONE, I CAN HEAR YOU NOW: TRAFFIC INTERCEPTION AND REMOTE MOBILE PHONE CLONING WITH A COMPROMISED CDMA FEMTOCELL, MACTANS: INJECTING MALWARE INTO IOS DEVICES VIA MALICIOUS CHARGERS, MOBILE ROOTKITS: EXPLOITING AND ROOTKITTING ARM TRUSTZONE, ROOTING SIM CARDS, ABUSING WEB APIS THROUGH SCRIPTED ANDROID APPLICATIONS, and LTE BOOMS WITH VULNERABILITIES.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://defcon.org/html/defcon-21/dc-21-speakers.html&quot;&gt;Defcon&lt;/a&gt; has: I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell, Defeating SEAndroid, and Inside The Strange World Of Java Cards SIM Card Apps And Over-The-Air Updates&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://ruxconbreakpoint.com/speakers/&quot;&gt;BreakPoint&lt;/a&gt; has: A TALE OF TWO ANDROIDS&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://2013.brucon.org/index.php/Schedule&quot;&gt;BruCON&lt;/a&gt; has: CobraDroid, Geolocation of GSM mobile devices, even if they do not want to be found
&lt;/ul&gt;
&lt;br&gt;
&lt;br&gt;
Stuff
&lt;ul&gt;
&lt;a href=&quot;http://www.silentservices.de/android-hushsms-root-edition-released/&quot;&gt;HushSMS ROOT Edition released&lt;/a&gt; Blog post about how to acquire certain permissions on Android. Good read for Android hackers.&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://www.zdziarski.com/blog/?p=2385&quot;&gt;Waterboard: Advanced Forensic Logical Acquisition for iOS Devices&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://revealapp.com/&quot;&gt;Runtime inspection for iOS apps&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.azimuthsecurity.com/2013/05/exploiting-samsung-galaxy-s4-secure-boot.html&quot;&gt;Exploiting Samsung Galaxy S4 Secure Boot&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.quarkslab.com/dl/Android-OEM-applications-insecurity-and-backdoors-without-permission.pdf&quot;&gt;Android OEM applications insecurity and backdoors without permission&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://labs.mwrinfosecurity.com/assets/410/mwri_blackberry-10-security_2013-06-03.pdf&quot;&gt;Is Blackberry Dead: intro to BB10 security&lt;/a&gt; (slides)&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://gsbabil.github.io/AntiTaintDroid/&quot;&gt;Anti Taint Droid&lt;/a&gt; source + paper&lt;br&gt;&lt;Br&gt;
&lt;/ul&gt;

</description>
 </item>
  <item>
 <title>Countering SMS/mTAN Trojans</title>
 <pubDate>Wed, 08 May 2013 18:58:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2013/05/08#smsotppaper</link>
 <description>
Together with my former colleagues Ravi, Patrick, Jean-Pierre from
TU Berlin / &lt;a href=&quot;http://sec.t-labs.tu-berlin.de&quot;&gt;SecT&lt;/a&gt; I have
been working on an enhancement for mobile phones in order
to protect SMS messages especially &lt;a href=&quot;http://en.wikipedia.org/wiki/Transaction_authentication_number#Mobile_TAN_.28mTAN.29&quot;&gt;mTANs&lt;/a&gt; against trojans.
&lt;br&gt;&lt;br&gt;
We investigated several ways to improve mTAN security and finally
came to the conclusion that we just need to change the SMS routing
on the mobile phone itself.&lt;br&gt;&lt;br&gt; &lt;b&gt;Basically we remove SMS messages
that contain mTANs from the normal delivery queue and only deliver them
to a special application. This way no other program (including trojans) 
can access the SMS message.&lt;/b&gt;
&lt;br&gt;&lt;br&gt;
We implemented and tested our idea on Android. The paper &lt;a href=&quot;https://www.mulliner.org/collin/academic/publications/mulliner_dimva2013.pdf&quot;&gt;SMS-based One-Time Passwords: Attacks and Defense&lt;/a&gt; will be presented at &lt;a href=&quot;http://dimva.sec.t-labs.tu-berlin.de/&quot;&gt;DIMVA 2013&lt;/a&gt; in July in Berlin, Germany.
&lt;br&gt;&lt;br&gt;
A demo video of the prototype is shown below:&lt;br&gt;
&lt;iframe width=&quot;560&quot; height=&quot;315&quot; src=&quot;http://www.youtube.com/embed/SF2HoK0D3_4&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update May 2013</title>
 <pubDate>Tue, 07 May 2013 17:11:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2013/05/07#mobile_security_update_may2013</link>
 <description>
Conferences
&lt;ul&gt;
&lt;a href=&quot;http://www.nosuchcon.org/&quot;&gt;NoSuchCon&lt;/a&gt; finally released their agenda.They have an interesting lineup but no mobile talk.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.sourceconference.com/dublin/speakers_2013.html&quot;&gt;SourceDublin&lt;/a&gt; Android application reverse engineering &amp; defensesi by Patrick Schulz &amp; Felix Matenaar.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.summercon.org/schedule.html&quot;&gt;SummerCon&lt;/a&gt; has posted it's schedule. I'll present some work I've done on Dynamic Dalvik Instrumentation.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.recon.cx/&quot;&gt;REcon&lt;/a&gt; has stared to post talks. Reversing HLR, HSS and SPR: rooting the heart of the Network and Mobile cores from Huawei to Ericsson by Philippe Langlois.  Reversing and Auditing Android's Proprietary Bits by Joshua J. Drake. 
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://shakacon.org/&quot;&gt;Shakacon&lt;/a&gt; Deviant Ollam - Android Phones Can Do That?!? Custom Tweaking for Power Security Users. Max Sobell - Android 4.0: Ice Cream &quot;Sudo Make Me a&quot; Sandwich. Andreas Kutz - Pentesting iOS Apps - Runtime Analysis &amp; Manipulation. 
&lt;/ul&gt;
&lt;br&gt;
Some interesting upcoming talks! I guess everybody else an their moms are waiting to hear back from the Black Hat USA CfP.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://syscan.org/index.php/sg/&quot;&gt;SyScan'13&lt;/a&gt; review
&lt;ul&gt;
SyScan was a totally awesome event. Really good talks and lots of them.
My favorite talk was: Bochspwn: Exploiting Kernel Race Conditions Found via Memory Access Patterns by Mateusz Jurczyk and Gynvael Coldwind. 
&lt;/ul&gt;
&lt;br&gt;
&lt;br&gt;
News
&lt;ul&gt;
&lt;a href=&quot;http://www.aclu.org/blog/technology-and-liberty/aclu-files-ftc-complaint-over-android-smartphone-security&quot;&gt;ACLU Files FTC Complaint Over Android Smartphone Security&lt;/a&gt; this story is a little older already but insecurity of old Android devices is a pressing issue.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
Links
&lt;ul&gt;
&lt;a href=&quot;http://vrt-blog.snort.org/2013/04/changing-imei-provider-model-and-phone.html&quot;&gt;Changing the IMEI, Provider, Model, and Phone Number in the Android emulator&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;A href=&quot;https://blog.fortinet.com/Finding-Similarities-and-Differences-at-DEX-Level/&quot;&gt;Finding Similarities and Differences at DEX Level&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://tinytocs.org/vol2/papers/tinytocs2-lange.pdf&quot;&gt;Securing Two-factor Authentication for Smartphones in a Usable Way by Adding a Connected Token&lt;/a&gt;
Two-factor authentication for smartphones is easy to break and can be secured by using a smart watch which acts as a connected token.
Matthias Lange (Technische Universität Berlin&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://tinytocs.org/vol2/papers/tinytocs2-tang.pdf&quot;&gt;Android Apps: What are they doing with your precious Internet?&lt;/a&gt;
The majority of Android apps are not malicious, but use internet access in ways that are not compatible with the user's interests.
Amy Tang (University of California Berkeley), Ashwin Rao (INRIA), Justine Sherry (University of California Berkeley), Dave Choffnes (University of Washington)
&lt;/ul&gt;
</description>
 </item>
  <item>
 <title>Mobile Security News Update April 2013</title>
 <pubDate>Thu, 11 Apr 2013 21:50:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2013/04/11#mobile_security_update_april2013</link>
 <description>
Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://www.hackcon.org/&quot;&gt;HackCon&lt;/a&gt; No.8 10-11 April in Oslo Norway. First time I hear about this conference. Mobile talks: Leveraging Mobile Devices on Penetration Tests and Want to control smart phones?&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;

Call for Papers:
&lt;ul&gt;
&lt;A href=&quot;http://www.wisa.or.kr/&quot;&gt;The 14th International Workshop on Information Security Applications (WISA2013)&lt;/a&gt; an academic workshop but they seek more practical papers comparable with Usenix WOOT.&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;

News:
&lt;ul&gt;
&lt;a href=&quot;http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html&quot;&gt;Unlocking the Motorola Bootloader&lt;/a&gt; (Android phones) by Dan Rosenberg. A real nice read. Most interesting part is that
the unlock is via attacking a vulnerability in code running in TrustZone.
&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;

I have been super busy with work so I might missed a few things here and there. Right now I'm waiting
to here back from SummerCon and Black Hat USA about talks I submitted. I'm still thinking about submitting to ReCON ;)</description>
 </item>
  <item>
 <title>Mobile Security News Update March 2013 part 2</title>
 <pubDate>Thu, 14 Mar 2013 21:40:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2013/03/14#mobile_security_update_March_13_2</link>
 <description>
CanSecWest was pretty good this year. My favorite talks were (no order):
Desktop Insecurity - Ilja van Sprundel &amp; Shane &quot;K2&quot; Macaulay, Smart TV Security - SeungJin Lee, Godel's Gourd - Fuzzing for Logic Issues - Mike &quot;dd&quot; Eddington, and Reflecting on Reflection - Exploiting Reflection Vulnerabilities in
Managed Languages - James Forshaw. I can't wait to get the slides.
&lt;br&gt;&lt;br&gt;

Call for Papers:
&lt;ul&gt;
&lt;A href=&quot;https://www.usenix.org/conference/woot13/call-for-papers&quot;&gt;Workshop on Offensive Technologies (WOOT)&lt;/a&gt; August, Washington D.C., academic but targeting people who would normally speak at Black Hat/CanSecWest/etc.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.summercon.org/cfp.html&quot;&gt;SummerCon&lt;/a&gt; in June, New York City
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://masshackers.pbworks.com/w/page/61663884/BeaCon&quot;&gt;BeaCon&lt;/a&gt; local mini con in Boston
&lt;/ul&gt;
&lt;br&gt;

I totally missed Black Hat Europe, it had some interesting talks: The M2M Risk Assessment Guide, A Cyber Fast Track Project - Don A. Bailey, Practical Attacks Against MDM Solutions - Daniel Brodie + Michael Shaulov, Off Grid Communications With Android- Meshing The Mobile World - Josh Thomas + Jeff Robble, Next Generation Mobile Rootkits - Thomas Roth. &lt;br&gt;
&lt;br&gt;

An interesting looking paper from TROOPERS13 &lt;a href=&quot;https://media.blackhat.com/ad-12/Niemietz/bh-ad-12-androidmarcus_niemietz-WP.pdf&quot;&gt;UI Redressing Attacks on Android Devices&lt;/a&gt; (apparently it was released at Black Hat Abu Dhabi last year).
&lt;br&gt;&lt;br&gt;
News
&lt;ul&gt;
&lt;a href=&quot;http://www.theverge.com/2013/3/13/4099450/andy-rubin-steps-down-as-head-of-android&quot;&gt;Andy Rubin steps down as head of Android&lt;/a&gt; ...interesting.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://permalink.gmane.org/gmane.comp.security.full-disclosure/88743&quot;&gt;A few android security issues&lt;/a&gt; ... worth reading!
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.facebook.com/notes/facebook-engineering/under-the-hood-dalvik-patch-for-facebook-for-android/10151345597798920&quot;&gt;Under the Hood: Dalvik patch for Facebook for Android&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;

Fun find by my former co-worker Matthias: &lt;a href=&quot;https://twitter.com/budvisor/status/310278100598534144&quot;&gt;Lost connection to Battery&lt;/a&gt; ... WTF!?!</description>
 </item>
  <item>
 <title>Mobile Security Update March 2013</title>
 <pubDate>Mon, 04 Mar 2013 16:14:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2013/03/04#mobile_security_update_March2013</link>
 <description>
Review RSA
&lt;ul&gt;
Last week I attend the RSA Conference for the first timer ever. I always
had the impression that it is not worth going but this year I went anyway.
The plan was to just hang around at the various side events that take place
during RSAC. Meeting with people etc. That part is totally worth it
if you can spent the day doing actual work. I ended up going to the conference
to speak on the &lt;a href=&quot;https://ae.rsaconference.com/US13/connect/sessionDetail.ww?SESSION_ID=1982&quot;&gt;Mobile Security Battle Royale&lt;/a&gt; panel (as a replacement for Jon Oberheide). So I got a conference pass and could checkout the actual
conference and expo. The expo was pretty standard if you are used to attend
events like CeBIT or maybe CES. Just smaller and security companies only. 
I didn't have the chance to attend other talks besides &lt;i&gt;Big Brother's Greek Tragedy State-Deployed Malware &amp; Trojans&lt;/i&gt; so I can't really make my mind up 
if it is worth the money or not.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.scmagazine.com/rsa-2013-ios-safer-than-android-due-to-open-app-model-patching-delays/article/282697/&quot;&gt;SC Magazine&lt;/a&gt; wrote an article
about the panel I spoke on. Here are some comments: &lt;i&gt;Android certainly does
support remote updates. But the problem really is that manufacturers and
mobile carriers stop supporting devices after 12-18 month.&lt;/i&gt;
&lt;/ul&gt;
&lt;br&gt;

Conferences
&lt;ul&gt;
&lt;a href=&quot;http://www.immunityinc.com/infiltrate/speakers.html&quot;&gt;Infiltrate&lt;/a&gt; posted a few more talks. The one I'm really interested in is: Josh &quot;m0nk&quot; Thomas - 
NAND-Xplore -&gt; Bad Blocks = Well Hidden.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.troopers.de/agenda13/index.html&quot;&gt;Troopers&lt;/a&gt; in Heidelberg Germany (March). They have a few interesting talks: UI Redressing Attacks on Android Devices by Marcus Niemietz, Malicious Pixels: QR-Codes as attack vectors by Peter Kieseberg, Corporate Espionage via Mobile Compromise: A Technical Deep Dive by David Weinstein and a few other non mobile talks that look really interesting.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://conference.hitb.org/hitbsecconf2013ams/&quot;&gt;Hack in the Box Amsterdam&lt;/a&gt; LTE Pwnage: Hacking HLR/HSS and MME Core Network Elements, SMS To Meterpreter: Fuzzing USB Internet Modems. I really need to go to HITB some day.
&lt;/ul&gt;
&lt;br&gt;

New Conferences
&lt;ul&gt;
&lt;a href=&quot;http://www.nosuchcon.org/&quot;&gt;NSC - NoSuchCon&lt;/a&gt; is a new conference
held in May in Paris, France. The organizers seek strong (only) technical 
content.
&lt;/ul&gt;
&lt;br&gt;

News
&lt;ul&gt;
&lt;a href=&quot;http://www.nytimes.com/2013/02/23/business/htc-settles-ftc-charges-over-security-flaws-in-devices.html&quot;&gt;HTC Settles Privacy Case Over Flaws in Phones&lt;/a&gt; Interesting read, quote: &lt;i&gt;The Federal Trade Commission charged HTC with customizing the software on its Android- and Windows-based phones in ways that let third-party applications install software that could steal personal information, surreptitiously send text messages or enable the device's microphone to record the user's phone calls.&lt;/i&gt;
&lt;/ul&gt;
&lt;br&gt;
Personal note:
&lt;ul&gt;
Wiley announced our book &lt;a href=&quot;http://www.wiley.com/WileyCDA/WileyTitle/productCd-111860864X.html&quot;&gt;Android Hacker's Handbook&lt;/a&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update February 2013</title>
 <pubDate>Thu, 31 Jan 2013 16:46:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2013/01/31#mobile_security_update_Feb2013</link>
 <description>
Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://cansecwest.com/&quot;&gt;CanSecWest&lt;/a&gt; coming up in March has started posting talks: Doug DePerry @dugdep &amp; Tom Ritter @TomRittervg - CDMA Femptocell Traffic Interception and Remote Mobile Phone Cloning, Rahul Sasi @fb1h2s - SMS to Meterpreter, Fuzzing USB Modems, Stephan Esser @i0n1c will be talking about iOS, Joshua J. Drake @jduck1337i - Tackling the Android Challenge. In addition to mobile security there is another super interesting talk about embedded system security: @beist will be talking about Samsung SmartTVs.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://syscan.org/index.php/sg/speakerlist&quot;&gt;SyScan&lt;/a&gt; Singapore is coming up in April and also posted talks. There are not too many mobile talks but all talks sound pretty good. Stefan Esser ( @i0n1c ) - Mountain Lion / iOS Vulnerability Garage Sale. I will also show some stuff I've been working on in the past month during a lightning talk, all brand new!
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.sourceconference.com/boston/speakers_2013.html&quot;&gt;SourceBoston&lt;/a&gt; also in April: Protecting sensitive information on iOS devices David Schuetz, Attacking NFC Mobile Wallets: Where Trust Breaks Down Max Sobell. 
&lt;br&gt;&lt;bR&gt;
&lt;a href=&quot;http://infiltratecon.com/speakers.html&quot;&gt;Infiltrate&lt;/a&gt; Matias Soler - 
The Chameleon: A cellphone-based USB impersonator, Stephen Lawler &amp; Stephen Ridley - Advanced Exploitation of Mobile/Embedded Devices: The ARM Microprocessor.
&lt;/ul&gt;
&lt;br&gt;
News:
&lt;ul&gt;
&lt;a href=&quot;http://www.osnews.com/story/26734/The_end_of_the_line_for_Symbian&quot;&gt;The end of the line for Symbian&lt;/a&gt; is kinda sad. Although I wasn't a big Symbian fan, Symbian was still pretty cool as a mobile OS. I had fun hacking it.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.infoworld.com/d/security/android-botnet-abuses-peoples-phones-sms-spam-209415&quot;&gt;Android botnet abuses people's phones for SMS spam&lt;/a&gt; this is just too funny. I kinda hat that on my slides for a couple of years already.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
Personal notes: I'm going to be in San Francisco during RSA, ping me if you want to chat. I'm also going to be at CanSecWest, just attending this year. Further I'm going to SyScan. I also plan to be around SourceBoston but unfortunately not attending (ticket prices vs. university etc, I'm not complaining). 
</description>
 </item>
  <item>
 <title>Mobile Security News Update January 2013</title>
 <pubDate>Fri, 04 Jan 2013 14:45:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2013/01/04#mobile_security_update_Jan_2013</link>
 <description>
Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://www.shmoocon.org/schedule&quot;&gt;Shmoocon 2013&lt;/a&gt; has posted their schedule. Mobile talks are: Armor for your Android Apps by Roman Faynberg, Protecting Sensitive Information on iOS Devices by David Schuetz, Apple iOS Certificate Tomfoolery by Tim Medin.
&lt;/ul&gt;

All other upcoming conferences (SyScan, CanSecWest, SourceBoston, Infiltrate) haven't posted any talks yet.
&lt;br&gt;&lt;br&gt;

My 29c3 conference review. The new location CCH in Hamburg is really nice. There is a lot of space and the space was used very well. Due to the space the conference was much more relaxed. This also counted for the talks. Most of the time everybody had a place to sit. One small downside of this years conference the schedule, sometimes three tech talks were running in parallel in different rooms. But all together I don't think anybody could complain about 29c3. For me personally one of the best congresses I ever attended. The recordings of the talks can be downloaded from &lt;a href=&quot;http://events.ccc.de/congress/2012/wiki/Documentation#Official_mirrors&quot;&gt;here&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
Happy New Year.</description>
 </item>
  <item>
 <title>Mobile Security News Update December 2012</title>
 <pubDate>Wed, 12 Dec 2012 15:39:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/12/12#mobile_security_update_dec_2012</link>
 <description>
Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://events.ccc.de/congress/2012/Fahrplan/events.en.html&quot;&gt;29c3&lt;/a&gt; end of December in Hamburg, Germany. They have a few mobile talks:
Small footprint inspection techniques for Android - Reverse engineering on Android platforms by Pierre Jaury, Setting mobile phones free by Mark van Cuijk. there should be more mobile talks, that are not announced yet.
&lt;/ul&gt;

&lt;br&gt;
News:
&lt;ul&gt;
&lt;a href=&quot;http://www.darkreading.com/vulnerability-management/167901026/security/news/240144260/top-mobile-vulnerabilities-and-exploits-of-2012.html&quot;&gt;Top Mobile Vulnerabilities And Exploits Of 2012&lt;/a&gt; by darkreading. I have mixed feelings about this &lt;i&gt;top list&lt;/i&gt;. The SMS Spoofing should not be on this list.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://webcache.googleusercontent.com/search?q=cache%3Ahttp%3A%2F%2Fjustinangel.net%2FHackingWindows8Games&amp;hl=de&amp;client=firefox-a&amp;hs=2e1&amp;tbo=d&amp;rls=org.mozilla%3Ade%3Aofficial&amp;strip=1&quot;&gt;Hacking Windows 8 Games&lt;/a&gt; (google-cache link) shows how badly the Windows 8 game and app payment stuff is protected.
&lt;/ul&gt;
&lt;br&gt;
Random stuff:
&lt;ul&gt;
For a side project I'm looking for original ROMs of Android devices. So far I only have found one site that has a collection of some devices: &lt;a href=&quot;http://shipped-roms.com/index.php?category=android&quot;&gt;Shipped-Roms.com&lt;/a&gt;. I know it is likely not legal to host stuff like this but I would be interested in getting roms for other devices.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://github.com/thomascannon/android-sms-spoof&quot;&gt;Android SMS Spoofer&lt;/a&gt; is a PoC for a well known Android bug that enables malware to trick the user into believing an SMS has been received.
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Android DBI v0.2 (BreakPoint version)</title>
 <pubDate>Fri, 30 Nov 2012 21:32:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/11/30#androiddbiv02</link>
 <description>
I finally managed to release v0.2 of my Android DBI framework. The
version I announced at BreakPoint and RuxCon.
&lt;br&gt;&lt;Br&gt;
New in this version: actually working Thumb support, nfc card emulation code for fuzzing.
&lt;br&gt;&lt;Br&gt;

&lt;a href=&quot;/android/feed/android_dbi_mulliner_breakpoint2012.pdf&quot;&gt;Slides&lt;/a&gt; &lt;br&gt;
&lt;a href=&quot;/android/feed/collin_android_dbi_v02.zip&quot;&gt;collin_android_dbi_v02.zip&lt;/a&gt; &lt;br&gt;
&lt;br&gt;
Happy hacking! Feedback is welcome!
</description>
 </item>
  <item>
 <title>Mobile Security News Update November 2012</title>
 <pubDate>Wed, 21 Nov 2012 22:23:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/11/21#mobile_security_update_Nov_2012</link>
 <description>
The last weeks were pretty crazy for me in terms of work, but stuff got
done so I have some new stuff to show next year.&lt;br&gt;&lt;br&gt;

Last month I've travelled to Melbourne Australia to speak at &lt;a href=&quot;http://www.ruxconbreakpoint.com&quot;&gt;BreakPoint&lt;/a&gt; and &lt;a href=&quot;http://www.ruxcon.org.au&quot;&gt;RuxCon&lt;/a&gt;. This was my first time travelling to Australia and I must say it was
good fun. BreakPoint was a good conference with some good talks and many
interesting people. RuxCon was great fun too, good talks, nice friendly people.
The trip was just too short.

&lt;br&gt;&lt;br&gt;
Conferences
&lt;ul&gt;
&lt;a href=&quot;http://www.blackhat.com/ad-12/briefings.html&quot;&gt;Black Hat Abu Dhabi&lt;/a&gt; 

Advanced Exploitation of ARM-based Mobile and Embedded Devices by Stephen Ridley
, Droid Exploitation Saga by Aditya Gupta and Subho Halder, Inspection of Windows Phone applications by Dmitriy Evdokimov and  Andrey Chasovskikh, Over-the-Air Cross-platform Infection for Breaking mTAN-based Online Banking Authentication by Alexandra Dmitrienko and Ahmad Sadeghi and Christopher Liebchen and Lucas Davi, Practical Security Testing for LTE Networks by Martyn Ruks and Nils, UI Redressing Attacks on Android Devices by Marcus Niemietz
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.baythreat.org/speakers.html&quot;&gt;BayThreat&lt;/a&gt; in Sunnyvale has a mobile talk. Daniel Peck - &quot;Dynamic Analysis and Exploration of Android Apps&quot;. Some of the other talks look good to.
&lt;br&gt;&lt;br&gt;
29c3 Chaos Communication Congress didn't publish a schedule yet. But some talks should be very interesting, such as &lt;a href=&quot;https://twitter.com/iamnion/status/266881802541596672&quot;&gt;Nico's&lt;/a&gt;.
&lt;/ul&gt;
&lt;br&gt;
Other upcoming conferences are: ShmooCon in February, CanSecWest in March, Infiltrate in April, and Source Boston also in April.
&lt;br&gt;&lt;br&gt;
As I said, crazy weeks behind me. So I didn't see much of what happened in the
mobile security space.</description>
 </item>
  <item>
 <title>DIMVA 2013</title>
 <pubDate>Mon, 29 Oct 2012 14:46:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/10/29#dimva2013</link>
 <description>
I'm the Publicity Chair for the upcoming 10th Conference on Detection of Intrusions and Malware &amp; Vulnerability Assessment (DIMVA 2013), thus I'm taking the
liberty to announce the opening of our Call for Papers here. The conference
is in July 2013 in Berlin, Germany. A good chance to travel to Berlin next summer.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://dimva.sec.t-labs.tu-berlin.de/&quot;&gt;DIMVA 2013&lt;/a&gt; main site.
&lt;br&gt;
&lt;a href=&quot;http://dimva.sec.t-labs.tu-berlin.de/cfp.html&quot;&gt;DIMVA 2013 CFP&lt;/a&gt;
</description>
 </item>
  <item>
 <title>Mobile Security News Update September 2012 part 2</title>
 <pubDate>Tue, 25 Sep 2012 15:18:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/09/25#mobile_security_update_sep_2012_2</link>
 <description>
First I want to talk about &lt;a href=&quot;http://www.isti.tu-berlin.de/security_in_telecommunications/menue/people/research_assistants/ravishankar_borgaonkar/&quot;&gt;Ravi's&lt;/a&gt; awesome findings on USSD and TEL URIs (RFC 2806).
Ravi was working on USSD security in general and found that on Android phones you can inject USSD codes
into the phone dialer via the TEL URI handler without user interaction. Meaning you don't have to
press the call button (aka the green button) to activate the USSD code. Using this he showed howto
brick SIM cards and howto wipe Samsung made Android phones. The beauty about TEL URIs is that
it is super easy to have them activated on a mobile phone. In 2010 I did a talk on this at
CanSecWest (&lt;a href=&quot;http://www.mulliner.org/security/feed/random_tales_mobile_hacker.pdf&quot;&gt;Random tales from a mobile phone hacker&lt;/a&gt; skip to the end of the talk for the TEL/SMS URI stuff). The basic technique used
for this kind of attack are iframes but very well can be any other kind of URI activation method (redirects, img tag, etc.).&lt;br&gt;
&lt;br&gt;
A video of Ravi's demo from Ekoparty is here &lt;a href=&quot;http://t.co/li2wPHjj&quot;&gt;Demo Dirty use of USSD Codes in Cellular Network en Ekoparty 2012&lt;/a&gt;.&lt;br&gt;&lt;br&gt;

Further infos: 
&lt;ul&gt;
&lt;a href=&quot;http://www.ietf.org/rfc/rfc2806.txt&quot;&gt;RFC2806&lt;/a&gt;&lt;br&gt;
the &lt;a href=&quot;http://www.mulliner.org/security/advisories/iphone_safari_phone-auto-dial_vulnerability_advisory.txt&quot;&gt;iPhone/iOS auto dialer bug&lt;/a&gt; I discovered a few years ago is based the TEL URI&lt;br&gt;
&lt;/ul&gt;

This is a super fun bug class also a little bit sad that stuff like this works at all.
&lt;br&gt;&lt;br&gt;

Second, more cool NFC/RFID mobile hacking from the good guys at Intrepidus. They investigated
RFID based transit passed and wrote an Android application that can reset the pass. While the
actual basic idea is not new I really like the phone as the attack tool since you always carry
it around with you. Some guy could stand one the corner next to the subway entry and &lt;i&gt;sell&lt;/i&gt;
you the service of resetting your transit pass. Check out their writeup: &lt;a href=&quot;http://intrepidusgroup.com/insight/2012/09/ultrareset-bypassing-nfc-access-control-with-your-smartphone/&quot;&gt;UltraReset - Bypassing NFC access control with your smartphone&lt;/a&gt;
&lt;br&gt;&lt;br&gt;

On the topic of NFC and security. The guy(s) behind &lt;a href=&quot;https://twitter.com/RadioWarCN&quot;&gt;RadioWarCN&lt;/a&gt; released an Android toolkit for messing with RFID/NFC tags. Check it out here: &lt;a href=&quot;http://forum.xda-developers.com/showthread.php?t=1886063&quot;&gt;Radiowar Release NFC-WAR Preview&lt;/a&gt;. I didn't had the time to try it myself.
&lt;br&gt;&lt;br&gt;

Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://sandiego.toorcon.org/index.php?option=com_content&amp;task=section&amp;id=3&amp;Itemid=9&quot;&gt;ToorCon&lt;/a&gt; in mid October (damn I can't go) so far has mobile talks lined up: Mobile Device attack graphs for fun and profit - Jimmy Shah. {Malandroid} The Crux of Android Infections - Aditya K Sood. When Cell Towers Become Too Smart For Their Own Good - Drew &quot;RedShift&quot; Porter. Also my former co-worker Dmitry (&lt;a href=&quot;http://www.hwsec.net&quot;&gt;hwsec.net&lt;/a&gt;) seems to be giving a talk, my bet is one hardware security.
&lt;/ul&gt;
&lt;br&gt;
That is it for now. I'm super busy working one a new Android security project. This will kick ass.</description>
 </item>
  <item>
 <title>Mobile Security News Update September 2012</title>
 <pubDate>Mon, 10 Sep 2012 18:58:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/09/10#mobile_security_update_sep_2012</link>
 <description>
Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://www.ekoparty.org/speakers-2012.php&quot;&gt;Ekoparty&lt;/a&gt; in Buenos Aires September 19-21. 
Alfredo Ortega &amp; Sebastian &quot;topo&quot; Muniz - Satellite baseband mods: Taking
control of the InmarSat GMR-2 phone terminal, Ravishankar Bhaskarrao Borgaonkar - Dirty use of USSD Codes in Cellular
Network. Ravi's talk will be awesome - this will hurt a lot.
&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://eusecwest.com/&quot;&gt;EuSecWest&lt;/a&gt; Dragos keeps adding mobile talks! Way to go!
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://sec-t.org/&quot;&gt;SEC-T&lt;/a&gt; also added a few talks since my last blog entry.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.hashdays.ch/talks/&quot;&gt;Hashdays&lt;/a&gt; end of October in Lucern Switzerland (the place to get a bank account ;) Ben April - NFC: I don't think it means what you think it means; Martin Rutishauser - Satellite Hacking: An Introduction. Ilja van Sprundel - The Security (or Insecurity) of 3rd Party iOS Applications.
 &lt;/ul&gt;

Links:
&lt;ul&gt;
&lt;a href=&quot;https://www.mylookout.com/resources/reports/state-of-mobile-security-2012&quot;&gt;State of Mobile Security 2012&lt;/a&gt; by the good guys from Lookout&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.silentservices.de/android-hushsms-got-cracked-again-do-i-care-no-should-you-yes-read-why/&quot;&gt;HushSMS got cracked again. Do I care? No! Should you? Yes! (read why)&lt;/a&gt; fun read about why you should not use cracked Android Apps that have SMS permissions ;-)
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://labs.mwrinfosecurity.com/advisories/2012/09/07/multiple-samsung-android-application-vulnerabilities/&quot;&gt;Multiple Samsung (Android) Application Vulnerabilities&lt;/a&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update August 2012 part</title>
 <pubDate>Mon, 20 Aug 2012 19:49:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/08/20#mobile_security_update_august_2012_2</link>
 <description>
More conferences!

&lt;ul&gt;
&lt;a href=&quot;http://deepsec.net/&quot;&gt;DeepSec&lt;/a&gt; taking place end of November in Vienna has published their 
schedule. They have a number of mobile talks as usual but unfortunately they also have THE one talk
that every conference has this year :-( The talks are: Introducing the Smartphone Pentesting Framework
Georgia Weidman (Bulb Security LLC), Pentesting iOS Apps - Runtime Analysis and Manipulation
Andreas Kurtz (NESO Security Labs / University of Erlangen-Nuremberg), Hacking the NFC credit cards for fun and debit ;)
Renaud Lifchitz (BT (formerly known as British Telecom)), The Security (or Insecurity) of 3rd Party iOS Applications
Ilja van Sprundel (IOActive, Inc.). 
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://eusecwest.com/&quot;&gt;EuSecWest&lt;/a&gt; happening in late September in Amsterdam. Dragos always had
this love for mobile security and this year he is showing this at EuSec. Basically EuSec is a mobile
security event this year, especially because of the mobile pwn2own! Talks so far: Mapping and Evolution of Android Permissions - Andrew Reiter &amp; Zach Lanier, APK Infection on Android - Robert McArdle &amp; Bob Pan, NFC For Free Rides and Rooms (on your phone) - Corey Benninger &amp; Max Sobell, Using HTTP headers pollution for mobile networks attacks - Bogdan Alecu , iOS Application Auditing - Julien Bachmann.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://2012.hack.lu/index.php/List&quot;&gt;Hack.LU&lt;/a&gt; in October also has a mobile talk. Benedikt Driessen -Satellite phone - an analysis of the GMR-1 and GMR-2 standards. 
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://conference.hitb.org/hitbsecconf2012kul/event/conference/&quot;&gt;Hack in The Box&lt;/a&gt; Malaysia seems to have a bunch of mobile stuff. But their conference website is so ugly that it is hard to find details :-(
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.sec-t.org/2012/talks-and-speakers.html&quot;&gt;SEC-T&lt;/a&gt; takes place in September in Stockholm - one of my favorit cons!. So far they have: Dead Addict - Mobile PKI UX: the state of shit, Torbjörn Lofterud - iPhone raw NAND recovery and forensics.
&lt;/ul&gt;
&lt;br&gt;
T2 does not seem to have any mobile stuff this year.
&lt;br&gt;
&lt;br&gt;
More upcoming CFPs should include ToorCon in San Diego but sadly it overlaps with BreakPoint. I would really like to
go to ToorCon once.
&lt;br&gt;&lt;br&gt;
It looks like I will come to NYC in November to give a talk at an event at NY-Poly. It is also likely
that I will come to SF early in December.
&lt;br&gt;&lt;br&gt;
&lt;br&gt;
News:
&lt;ul&gt;
&lt;a href=&quot;http://threatpost.com/en_us/blogs/smszombie-malware-infecting-android-devices-stealing-money-082012&quot;&gt;SMSZombie Malware Infecting Android Devices, Stealing Money&lt;/a&gt; more SMS-based trojans for Android. This stuff wont go away until something in Android changes.
&lt;/ul&gt;
&lt;br&gt;
By now I arrived in Boston and started working at my new job at &lt;a href=&quot;http://www.ccs.neu.edu&quot;&gt;Northeastern University&lt;/a&gt;. So far I haven't done much in the city. I'm still looking for an apartment so if you have good pointers shoot me an email. 
</description>
 </item>
  <item>
 <title>Mobile Security News Update August 2012</title>
 <pubDate>Tue, 07 Aug 2012 15:13:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/08/07#mobile_security_update_august_2012</link>
 <description>
This really is the first update since May, wow I have been really busy.&lt;br&gt;&lt;br&gt;

Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://toorcamp.org/talks&quot;&gt;Toorcamp&lt;/a&gt; (takes place as you read) has a few interesting talks on Android. I originally planed to go but didn't have time, very said about it :-(&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://nsc.is/&quot;&gt;Nordic Security Conference&lt;/a&gt; is a new event that takes place end of August. Nordic Sec seems to be a very mixed conference but they have some mobile related talks.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://2012.brucon.org/index.php/Schedule&quot;&gt;BruCON&lt;/a&gt; at the end of September is one of those cons I always wanted to attend once, never made it. They also have just a few mobile related talks. Mobile talks seem to overlap with Nordic Sec :-(
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.ruxconbreakpoint.com/&quot;&gt;BreakPoint&lt;/a&gt; is also a new event taking place in Melbourne, Australia. This event will have more then a few mobile talks due to the people who are scheduled to speak there. Including myself ;-)
&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://www.sourceconference.com/seattle/speakers_2012.asp&quot;&gt;Source Seattle&lt;/a&gt; has a mobile talk.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;

Open CFPs: &lt;a href=&quot;http://events.ccc.de/2012/08/03/call-for-participation-for-29th-chaos-communication-congress/&quot;&gt;29c3&lt;/a&gt; this year in Hamburg not Berlin, a real bummer. &lt;a href=&quot;https://www.hashdays.ch/cfp/&quot;&gt;hashdays&lt;/a&gt; in Lucerne, Switzerland.

&lt;br&gt;&lt;br&gt;

General News:
&lt;ul&gt;
Zeus now &lt;i&gt;supports&lt;/i&gt; &lt;a href=&quot;http://threatpost.com/en_us/blogs/zeus-comes-blackberry-080712#.UCEn3qAYQ9c.twitter&quot;&gt;Black Berry&lt;/a&gt; in addition to WinMo, Android, and Symbian.
&lt;br&gt;&lt;br&gt;
This is really interesting. I was working on countermeasures against this threat
with two of my co-workers at &lt;a href=&quot;http://www.sec.t-labs.tu-berlin.de&quot;&gt;SecT&lt;/a&gt; in Berlin. Hopefully our paper gets accepted. I really hope we can
help to defend against this threat.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
Personal news: I will move to Boston, MA in August to work as a Postdoctoral researcher at Northeastern University. I will continue doing mostly mobile security related work. Please ping me if you are doing similar work and are in the area. It seems like I know a bunch of people but don't actually know where they live.
&lt;br&gt;&lt;br&gt;
I hope from now one to continue my biweekly mobile security news update.</description>
 </item>
  <item>
 <title>Android DBI Framework Source!</title>
 <pubDate>Tue, 19 Jun 2012 10:04:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/06/19#android_dbi_v01</link>
 <description>
I just uploaded my Android Dynamic Binary Instrumentation (DBI) framework. As I wrote before
the framework is very simple. It supports hooking function entry points only. The source
includes the shared library (.so) injector and the hooking/patching functionality. I also
included one simple example &lt;i&gt;instrument&lt;/i&gt; to sniff the UART communication between
com.android.nfc and the NFC chip on a Galaxy Nexus.
&lt;br&gt;&lt;br&gt;
I plan to further enhance this toolset and welcome everybody to submit patches. If there
is a lot of interest I will move the source to a public archive like github.
&lt;br&gt;&lt;br&gt;
The first release is available here: &lt;a href=&quot;/android/feed/collin_android_dbi_v01.zip&quot;&gt;collin_android_dbi_v01.zip&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
To use this tool you need a Linux ARM gcc compiler such as included in the Android NDK.</description>
 </item>
  <item>
 <title>Binary Instrumentation on Android</title>
 <pubDate>Mon, 11 Jun 2012 16:32:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/06/11#binary_instrumentation_on_android</link>
 <description>
Last weekend I attended &lt;a href=&quot;http://www.summercon.org&quot;&gt;SummerCon&lt;/a&gt; in Brooklyn NYC and presented my take at doing &lt;a href=&quot;/android&quot;&gt;binary instrumentation on Android&lt;/a&gt;. My way of doing instrumentation is very simple compared with other instrumentation frameworks but so far nobody build and released anything for
Android / ARM so I had to build my own. Have said that I will for sure release my &lt;i&gt;framework&lt;/i&gt; I just need a few days to do this! Please feel free to bug me about this!
&lt;br&gt;&lt;br&gt;
So why did I start with binary instrumentation? Well I wanted to continue my
&lt;a href=&quot;/nfc&quot;&gt;NFC&lt;/a&gt; security research on Android. Since NFC involves extra
hardware it also includes a bunch of native code and thus I started instrumenting that. The result so far was that I build an instrument that acts as an
emulation layer inside com.android.nfc. This emulation layer allows me to inject payloads of RFID tags into the nfc process as if they where read from an actually tag. This is of course build for fuzzing ;-) I haven't done any real fuzzing using this so far because I just finished the tool before SummerCon. A demo video that shows tag read emulation can be seen here: &lt;a href=&quot;/android/feed/nfcemuvideo.mp4&quot;&gt;nfcemuvideo.mp4&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
More updates on both subjects will follow soon!
&lt;br&gt;&lt;br&gt;&lt;br&gt;

SummerCon was totally awesome, many thanks to the organizers! The conference
was small enough to speak to all presenters and to many of the attendees. I met like half of the US people I follow on twitter for the first time in person. How awesome is this!</description>
 </item>
  <item>
 <title>Mobile Security News Update May 2012 part 2</title>
 <pubDate>Wed, 23 May 2012 09:58:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/05/23#mobile_security_update_may_2012_part2</link>
 <description>
Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://blackhat.com/html/bh-us-12/bh-us-12-briefings.html&quot;&gt;Black Hat USA&lt;/a&gt; has more or less publish the speaker list. Very mixed but some mobile stuff as always.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://defcon.org/html/defcon-20/dc-20-speakers.html&quot;&gt;Defcon&lt;/a&gt; started to publish some talks. So far one talk on mobile spyware.
&lt;/ul&gt;

Papers:
&lt;ul&gt;
&lt;a href=&quot;http://web.eecs.umich.edu/~zhiyunq/tcp_sequence_number_inference/&quot;&gt;Off-Path TCP Sequence Number Inference Attack&lt;/a&gt; a interesting attack with a nice proof-of-concept for mobile operators.
&lt;/ul&gt;

Security week in Europe, we have:
&lt;a href=&quot;http://conference.hitb.org/hitbsecconf2012ams/pagelist2/conference-2/&quot;&gt;HITB&lt;/a&gt; in Amsterdam, &lt;a href=&quot;http://2011.confidence.org.pl/agenda&quot;&gt;Confidence&lt;/a&gt; in Krakow, &lt;a href=&quot;http://berlinsides.org/&quot;&gt;BerlinSides&lt;/a&gt; in Berlin lets hope all the people who fly out for HITB and Confidence make it over to Berlin for the weekend.</description>
 </item>
  <item>
 <title>Mobile Security News Update May 2012</title>
 <pubDate>Wed, 09 May 2012 10:45:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/05/09#mobile_security_update_May_2012</link>
 <description>
Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://conference.hitb.org/hitbsecconf2012ams/pagelist2/conference-2/&quot;&gt;Hack in The Box Amsterdam&lt;/a&gt; has a number mobile talks this year&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.summercon.org/&quot;&gt;SummerCon&lt;/a&gt; has some Android related talks by Jon, Charlie, and myself :) &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://recon.cx/2012/schedule/index.en.html&quot;&gt;Recon&lt;/a&gt; looks pretty good this year: GPUs for Mobile Malware, Mitigation and More Thinking outside-the-CPU by Jared Carlson. Baseband debugging by Ralf-Philipp Weinmann. The other talks also look quite interesting. Happy to attend this year!&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blackhat.com/html/bh-us-12/bh-us-12-briefings.html&quot;&gt;Black Hat USA&lt;/a&gt; is starting to post talks: most interesting so far is the Windows Phone 7 talk by Tuskasa Oi&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://nsc.is/&quot;&gt;Nordic Security Conference&lt;/a&gt; seem to be a new conference out in Reykjavik Iceland. They also seem to have some mobile talks.&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;

So I will be going to SummerCon this year after all! I'm staying in NYC for a few days even after SummerCon. Ping me if you want to meet.&lt;br&gt;&lt;br&gt;

Other news:
&lt;ul&gt;
&lt;a href=&quot;http://www.guardian.co.uk/technology/2012/may/06/sms-text-messages-20th-birthday&quot;&gt;20 years of SMS&lt;/a&gt; I for sure had a lot of fun with SMS over the last years :)&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;
Links:
&lt;ul&gt;
&lt;a href=&quot;http://copgeek018.wordpress.com/2011/12/31/rd-into-jtag-process-in-relation-to-blackberry-8130/&quot;&gt;R&amp;D Into JTAG Process in Relation to Blackberry 8130&lt;/a&gt; a whole blog about JTAGing smartphones.
&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;
Some fun:
&lt;ul&gt;
Two really funny Dilbert comics of last week. &lt;a href=&quot;http://dilbert.com/2012-05-03/&quot;&gt;Free Apps Stealing your personal info&lt;/a&gt; and &lt;a href=&quot;http://dilbert.com/2012-05-04/&quot;&gt;A tazer that looks like a cellphone&lt;/a&gt;
&lt;/ul&gt;
&lt;br&gt;
EOF</description>
 </item>
  <item>
 <title>Mobile Security News Update April 2012</title>
 <pubDate>Thu, 12 Apr 2012 08:04:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/04/12#mobile_security_update_April2012</link>
 <description>
It has been a while but I was travelling a lot for work and fun so I really didn't have time.
&lt;br&gt;&lt;br&gt;

Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://2012.hackitoergosum.org/blog/schedule/schedule&quot;&gt;Hackito Ergo Sum&lt;/a&gt; in Paris just started today. This seems to be one of the cool new European Security Cons. I actually wanted to attend but after almost 7 weeks of travelling no chance. The program looks very mixed but they have a few mobile talks: Hacking the NFC credit cards for fun and debit by Renaud Lifchitz, TBD (Android Exploitation) by Georg Wicherski.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://syscan.org/index.php/sg/program&quot;&gt;SyScan Singapore&lt;/a&gt; iOS Kernel Heap Armageddon by Stefan Esser, iOS Applications - Different Developers, Same Mistakes by Paul Craig, and Exploiting the Linux Kernel: Measures and Countermeasures (not a mobile talk but sounds interesting) by Jon Oberheide.
&lt;/ul&gt;
Upcoming in June without program yet: SummerCon in NYC (sadly I can't make it), Recon in Montreal (which I try to make).
&lt;br&gt;&lt;br&gt;
On the academic front please consider submitting to &lt;a href=&quot;https://www.usenix.org/conference/woot12&quot;&gt;WOOT&lt;/a&gt; one of my favorite workshops!
 </description>
 </item>
  <item>
 <title>Mobile Security News Update February 2012 update</title>
 <pubDate>Fri, 10 Feb 2012 14:08:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/02/10#mobile_security_update_feb_2012_update</link>
 <description>
More conferences, and a lot of mobile stuff :-)
&lt;ul&gt;
&lt;a href=&quot;http://www.sourceconference.com/boston/speakers_2012.asp&quot;&gt;Source Boston&lt;/a&gt; in April. Reverse Engineering Mobile Applications, Adam Meyers, Security Researcher; Mobile Snitch - Devices telling the world about you, Luiz  Eduardo, Director, SpiderLabs LAC, Trustwave (@effffn) &amp; Rodrigo Montoro, Security Researcher, Trustwave's SpiderLabs, rmontoro@trustwave.com (@spookerlabs); Android Modding for the Security Practitioner, Dan Rosenberg, Senior Security Consultant, VSR (@djrbliss) ; Privacy at the Border: A Guide for Traveling with Devices, Marcia Hofmann, Senior Staff Attorney &amp; Seth Schoen, Senior Staff Technologist, Electronic Frontier Foundation
&lt;br&gt;&lt;br&gt;
So SourceBoston actually has some interesting stuff for us mobile people.
&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;https://www.blackhat.com/html/bh-eu-12/bh-eu-12-briefings.html&quot;&gt;Black Hat Europe&lt;/a&gt; in Amsterdam. Axelle Apvrille - Guillaume Lovet
An Attacker's Day into Virology: Human vs Computer; Don A. Bailey
War Texting: Weaponizing Machine to Machine Systems; Tyrone Erasmus
The Heavy Metal That Poisoned the Droid; Eric Fulton
Workshop: Mobile Network Forensics Workshop ; Dan Guido - Mike Arpaia
The Mobile Exploit Intelligence Project; Felix Lindner
Apple vs. Google Client Platforms; Simon Roses Femerling
Smartphones Apps Are Not That Smart: Insecure Development Practices; 
&lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update February 2012</title>
 <pubDate>Thu, 09 Feb 2012 14:38:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/02/09#mobile_security_update_feb_2012</link>
 <description>
Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://cansecwest.com/speakers.html&quot;&gt;CanSecWest&lt;/a&gt;: OS5 - An Exploitation Nightmare? - Stefan Esser; Probing Mobile Operator Networks - myself; Legal Issues in Mobile Security Research - Marcia Hofmann, EFF; Unveiling LTE Security - Dr. Galina D. Pildush, Juniper; Intro to Near Field Communication (NFC) Mobile Security - Corey Benninger and Max Sobell, Intrepidus Group; Root-Proof Smartphones, and Other Myths and Legends - Scott G. Kelly, Netflix&lt;br&gt;&lt;br&gt;
Interesting lineup for mobile stuff, and the rest looks pretty good too.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.syscan.org/index.php/sg/speakers&quot;&gt;SyScan Singapore&lt;/a&gt;: 
iOS Kernel Heap Armageddon - Stefan Esser; iOS Applications - Different Developers, Same Mistakes - Paul Craig
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.troopers.de/troopers12/agenda/&quot;&gt;Troopers&lt;/a&gt; (Germany): Welcome to Bluetooth Smart - Mike Ossmann 
&lt;br&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;

Links:
&lt;ul&gt;
&lt;a href=&quot;http://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares&quot;&gt;Database for Android Malware&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://www.theregister.co.uk/2012/02/09/google_wallet_pin/?utm_source=dlvr.it&quot;&gt;Google Wallet PIN security cracked in seconds&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://www.symantec.com/connect/blogs/androidbmaster-million-dollar-mobile-botnet&quot;&gt;Android.Bmaster: A Million-Dollar Mobile Botnet&lt;/a&gt;&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://gmr.crypto.rub.de/&quot;&gt;An analysis of the GMR-1 and GMR-2 standards&lt;/a&gt; for satellite telephony. Really interesting work.
&lt;br&gt;&lt;br&gt;

In other news. I'm done with &lt;a href=&quot;/collin/academic/&quot;&gt;my work in Berlin&lt;/a&gt; and looking to move to the US for a postdoc in the near future (location is not yet decided).</description>
 </item>
  <item>
 <title>Mobile Security News Update January 2012 part 2</title>
 <pubDate>Mon, 16 Jan 2012 10:37:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/01/16#mobile_security_update_Jan2012_p2</link>
 <description>
Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://immunityinc.com/infiltrate/schedule.html&quot;&gt;Infiltrate&lt;/a&gt; already passed. But they only had two mobile talk anyway. Secrets in Your Pocket: Analysis of [Your] Wireless Data by Mark Wuergler. Don't Hassle The Hoff: Breaking iOS Code Signing by Charlie Miller.&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.shmoocon.org/schedule&quot;&gt;Shmoocon&lt;/a&gt; which I miss again, this is way to early in the year so every year so far I totally miss it. Talks: Building Measurement and Signature Intelligence (MASINT) Capabilities on a Hackers Budget: Tracking and Fingerprinting RF Devices for Fun and Profit by Brad Bowers. Intro to Near Field Communication (NFC) Mobile Security by Corey Benninger and Max Sobell. Android Mind Reading: Memory Acquisition and Analysis with DMD and Volatility by Joe Sylve. Whack-a-Mobile: Getting a Handle on Mobile Testing with MobiSec Live Environment by Tony DeLaGrange and Kevin Johnson. Credit Card Fraud: The Contactless Generation by Chris Paget.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.cansecwest.com&quot;&gt;CanSecWest&lt;/a&gt; is upcoming. So far no talks have been posted but I'm going speak on &quot;Probing Mobile Operator Networks&quot;. This is a long ongoing side project of mine.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
Links: &lt;a href=&quot;http://www.veracode.com/blog/2012/01/mobile-security-android-vs-ios/&quot;&gt;Infographics: Mobile Security Android vs. iOS&lt;/a&gt;&lt;br&gt;&lt;bR&gt;
The &lt;a href=&quot;http://mirror.fem-net.de/CCC/28C3/&quot;&gt;video recordings&lt;/a&gt; from &lt;a href=&quot;http://events.ccc.de/congress/2011/wiki/Welcome&quot;&gt;28c3&lt;/a&gt; are online. Check out Harald's talk Cellular protocol stacks for Internet, Luca's and Karsten's talk Defending mobile phones, Sylvain's talk Introducing Osmo-GMR. </description>
 </item>
  <item>
 <title>Mobile Security News Update January 2012</title>
 <pubDate>Mon, 02 Jan 2012 20:41:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2012/01/02#mobile_security_update_Jan2012</link>
 <description>
so 2011 is history, it was a fun year for us mobile people. Many things
happened many things got hacked - just great.
&lt;br&gt;&lt;br&gt;
In the last few days I have been reading some of those &lt;i&gt;security predictions&lt;/i&gt; for 2012 (this year!). Most of them &lt;a href=&quot;http://www.sans.edu/research/security-laboratory/article/security-predict2011&quot;&gt;1&lt;/a&gt; &lt;a href=&quot;http://threatpost.com/en_us/blogs/slideshow-five-security-predictions-2012-122711&quot;&gt;2&lt;/a&gt; 
&lt;a href=&quot;http://blogs.mcafee.com/enterprise/security-connected/10-security-predictions-for-2012-top-trends-2&quot;&gt;3&lt;/a&gt; 
&lt;a href=&quot;http://blog.damballa.com/?p=1461&quot;&gt;4&lt;/a&gt; 
&lt;a href=&quot;http://blog.mylookout.com/blog/2011/12/13/2012-mobile-threat-predictions/&quot;&gt;5&lt;/a&gt;

are kinda boring since these are things that are already happening. Never the less these will very likely become reality.
&lt;br&gt;&lt;br&gt;
In the mobile area these seem to be:&lt;br&gt;&lt;br&gt;
&lt;b&gt;Android&lt;/b&gt; as the target for mobile malware attacks. This is already happening
as Android became the major smartphone platform last year.
&lt;br&gt;&lt;br&gt;
&lt;b&gt;Mobile Markets&lt;/b&gt; such as the AppStore and Android Market as a key issue
problem solver in the mobile field.
&lt;br&gt;&lt;br&gt;
&lt;b&gt;More Monetization&lt;/b&gt; as mobile malware evolves we will see more 
monetization of it. This is especially interesting for everything that involves spending money using a smartphone. Not only SMS, but advertisement, in-App payment, the phone as a credit card, etc..
&lt;br&gt;&lt;br&gt;
&lt;br&gt;
Happy mobile security research 2012 to everybody!</description>
 </item>
  <item>
 <title>Mobile Security News Update December 2011 part 2</title>
 <pubDate>Tue, 20 Dec 2011 10:39:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/12/20#mobile_security_update_dec_2011_part2</link>
 <description>
There was an awesome &lt;a href=&quot;http://news.cnet.com/8301-1009_3-57341918-83/sms-flaw-reportedly-found-in-windows-phone-7.5/&quot;&gt;SMS bug in Windows Phone 7&lt;/a&gt;. This is exactly the bug class I have been looking into in the last two years. Too bad that I didn't have the time to look into Windows Phone 7.
&lt;br&gt;&lt;br&gt;

Corrections to a news article about my research. &lt;a href=http://blogs.computerworld.com/19428/nfc_mobile_threats_on_the_horizon_what_happens_when_we_wave_our_wallets_to_pay&gt;NFC mobile threats on the horizon: What happens when we wave our wallets to pay?&lt;/a&gt; The article says &lt;i&gt;...malicious code could be 'injected' into the device...&lt;/i&gt;. I want to say that I &lt;b&gt;never claimed&lt;/b&gt; I can do code injection through NFC. They probably misunderstood me when I said that this could be possible in the future. 
&lt;br&gt;&lt;br&gt;
It is really great to see how NFC security research is taking of this year. If I remember back to early 2008 when I did my research everybody was kinda laughing.&lt;br&gt;&lt;br&gt;
In other news mobile (in)security is further on the rise. So we all never loose our jobs!</description>
 </item>
  <item>
 <title>Mobile Security News Update December 2011</title>
 <pubDate>Thu, 01 Dec 2011 10:49:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/12/01#mobile_security_update_dec_2011</link>
 <description>
Android root exploit for 2.3.5 and older by the Jons &lt;a href=&quot;http://jon.oberheide.org/files/levitator.c&quot;&gt;levitator.c&lt;/a&gt;&lt;br&gt;&lt;br&gt;

I don't get this whole Carrier IQ thing &lt;a href=&quot;http://techcrunch.com/2011/11/29/carrier-iq-video-shows-alarming-capabilities-of-mobile-tracking-software/&quot;&gt;1&lt;/a&gt; &lt;a href=&quot;http://www.intomobile.com/2011/11/30/carrier-iq-code-spotted-ios/&quot;&gt;2&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;

The people from the Intrepidus Group seem to really get into RFID and NFC. They just posted an article about using a &lt;a href=&quot;http://intrepidusgroup.com/insight/2011/11/usrp-for-nfc-part-1/&quot;&gt;USRP for NFC&lt;/a&gt;. Hopefully they release their
code after they are done with their research.
&lt;br&gt;&lt;br&gt;

In other news: I wont attend the CCC / 28c3 this year due to multiple reasons. I will stick around for the other events outside the congress. So ping we if you want to chat and/or have beers.</description>
 </item>
  <item>
 <title>Mobile Security News Update November 2011</title>
 <pubDate>Fri, 18 Nov 2011 13:24:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/11/18#mobile_security_update_Nov_2011</link>
 <description>
&lt;a href=&quot;https://www.lateralsecurity.com/OurTools.html&quot;&gt;Security Mobile and RFID&lt;/a&gt; by Nick von Dadelszen at KiwiCon. Interesting talk on RFID attacks
using the Nexus S. This does not cover NFC but is a good read. Unfortunately
not many details in the slides.
&lt;br&gt;&lt;br&gt;

Axelle Apvrille did some nice work on how to utilize &lt;a href=&quot;http://blog.fortinet.com/openbts-for-mobile-malware-analysis/&quot;&gt;OpenBTS for mobile malware analysis&lt;/a&gt;. Both, paper and slides, make a nice read.
&lt;br&gt;&lt;br&gt;

&lt;a href=&quot;http://www.ruxcon.org.au&quot;&gt;Ruxcon&lt;/a&gt; is already on, I found one
possibly interesting talk &lt;i&gt;Mobile and Contactless Payment Security&lt;/i&gt; by Peter Fillmore. But since the con is not done yet slides are not available at the time.&lt;br&gt;&lt;br&gt;

&lt;a href=&quot;http://www.syscan.org/index.php/tw/&quot;&gt;SyScan Taipei&lt;/a&gt; has a bunch of mobile stuff. Charlie Miller on iOS code signing. Stefan Esser on iOS kernel exploitation. I'm waiting for slides as the con is just over today.&lt;br&gt;&lt;br&gt;

New Academic Workshop &lt;a href=&quot;http://mostconf.org/2012/&quot;&gt;MoST&lt;/a&gt; on &lt;i&gt;Mobile Security Technologies&lt;/i&gt; at IEEE S&amp;P in May 2012.</description>
 </item>
  <item>
 <title>Mobile Security News Update August 2011</title>
 <pubDate>Sat, 20 Aug 2011 10:58:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/08/20#mobile_security_update_August_2011</link>
 <description>
I'm finally back from my two weeks in the US of A where I attended Black Hat and Defcon (19) in Vegas. This was very exhausting as always, no surprise there. But I must say the talk quality was not that high and again too many parallel tracks at Black Hat. As I see it now I will probably skip Black Hat and Defcon in the near future. After Vegas I travelled to USENIX Security in San Francisco to finally present our paper on SMS insecurity on feature phones. USENIX was quite okay - but I didn't get to enjoy it in full due to the one week of Las Vegas before :-/ To compensate for the stressful travel I attended the last two days of the CCCamp outside of Berlin. Also I only attended the lasts days the CCCamp rocked! Still one of the best events ever!&lt;br&gt;
&lt;a target='_blank' title='yfrog.com - Image And Video Hosting' href='http://yfrog.com/gyrwwlnj'&gt;&lt;img src='http://a.yfrog.com/img610/7817/rwwln.th.jpg' border='0'/&gt;&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
News:
&lt;ul&gt;
So Palm is finally dead now that HP killed their WebOS devices. Although
I've read something about HP wanting to continue with developing WebOS
as a platform but this is kinda useless if they don't intend to sell
devices running WebOS. Sad sad thing.
&lt;/ul&gt;
Conferences:
&lt;ul&gt;
&lt;a href=&quot;https://deepsec.net/schedule.html&quot;&gt;DeepSec&lt;/a&gt; that takes place in Vienna in November has a bunch of mobile related talks. Intelligent Bluetooth fuzzing - Why bother? by Tommi Mäkilä (Codenomico; Windows Pwn 7 OEM - Owned Every Mobile? by Alex Plaskett (MWR InfoSecurity); SMS Fuzzing - SIM Toolkit Attack by Bogdan Alecu (Independent security researcher); Extending Scapy by a GSM Air Interface and Validating the Implementation Using Novel Attacks by Laurent 'kabel' Weber (Ruhr Uni Bochum); Attack vectors on mobile devices by Tam Hanna (Tamoggemon Limited); Defeating BlackBerry Malware &amp; Forensic Analysis by Sheran A. Gunasekera (ZenConsult Pte. Ltd.)
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://t2.fi/schedule/2011/&quot;&gt;T2&lt;/a&gt; in October in Helsinki. Sofar they have only one talk on mobile security. Windows Pwn 7 OEM - Owned Every Mobile? by Alex Plaskett (MWR InfoSecurity).
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://2011.hack.lu/index.php/List&quot;&gt;Hack.lu&lt;/a&gt; in September in Luxenburg. They seem to have a few interesting talks. Project Ubertooth: Building a Better Bluetooth Adapter by Michael Ossmann. Extending Scapy by a GSM Air Interface and Validating the implementation Using Classical and Novel Attacks by Laurent Weber. Locating a GSM phone in a given area without user consent by Iosif Androulidakis.Weaponizing the Smartphone: Deploying the Perfect WMD by Kizz Myanthia. &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://conference.hitb.org/hitbsecconf2011kul/&quot;&gt;Hack in the Box Malaysia&lt;/a&gt; in October. Some talks: Packets in the Dark - Pwning a 4G Device for the Lulz by biatch0 &amp; RuFI0. Satellite Telephony Security: What is and What Will Never Be by Jim Geovedi. Femtocells: A Poisonous Needle in the Operator's Hay Stack by Kevin, Ravi, and Nico (SecT - TU Berlin). All Your Base Stations are Belong to Us: Extending Scapy with a GSM Air Interface - Laurent 'Kabel' Weber. Blackbox Android: Breaking &quot;Enterprise Clas&quot; Applications and Secure Containers by Marc Blanchou, Justine Osborne &amp; Mathew Solnik (Security Consultants, iSEC Partners). Attacking The GPRS Roaming eXchange (GRX) by Philippe Langlois. Hacking Androids for Profit by Riley Hassell. iPhone Exploitation: One ROPe to Bind Them All? by Stefen Esser. 
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.hashdays.ch/schedule.html&quot;&gt;hashdays&lt;/a&gt; in October. Talks: Tobias Ospelt - Reversing Android Apps - Hacking and cracking Android apps is easy.
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
Thats this for now. I guess I missed a bunch of things during the last three weeks (two weeks of travel and one week of recovery!). If something major had happened in the mobile sec world I guess I would have heard about it ;-)</description>
 </item>
  <item>
 <title>Mobile Security News Update July 2011 part 2</title>
 <pubDate>Mon, 18 Jul 2011 08:03:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/07/18#mobile_security_update_July_2011_p2</link>
 <description>
Not much to tell in this update since I was kinda busy with non work stuff ;-)
&lt;br&gt;&lt;br&gt;

Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://events.ccc.de/camp/2011/Fahrplan/events.en.html&quot;&gt;Chaos Communication Camp&lt;/a&gt; has a few mobile related talks: Applied Research on security of TETRA radio by Harald Welte, GPRS Intercept by Karsten Nohl, iOS application security by Ilja van Sprundel, Machine-to-machine (M2M) security by hunz, Open-source 4G radio by Alexander Chemeris, The blackbox in your phone (about SIM cards) by hunz and some more closely related talks. The camp talks look really good this year.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.defcon.org/html/defcon-19/dc-19-news.html#dc19speakers6&quot;&gt;Defcon&lt;/a&gt; Cellular Privacy: A Forensic Analysis of Android Network Traffic by Eric Fulton, Seven Ways to Hang Yourself with Google Android by Jacob West and Yekaterina Tsipenyuk ONeil.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://2011.brucon.org/index.php/Schedule&quot;&gt;BruCon&lt;/a&gt; iOS Data Protection Internals (Andrey Belenko), Smart Phones - The Weak Link in the Security Chain (Nick Walker - tel0seh)
&lt;/ul&gt;
&lt;br&gt;

Links:
&lt;ul&gt;
&lt;a href=&quot;http://www.simonroses.com/exploring-android-malware/&quot;&gt;Exploring Android Malware&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://l4android.org/&quot;&gt;L4Android&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://www.l4openbsd.org/&quot;&gt;L4OpenBSD&lt;/a&gt;&lt;br&gt;
&lt;/ul&gt;
</description>
 </item>
  <item>
 <title>Mobile Security News Update July 2011</title>
 <pubDate>Mon, 11 Jul 2011 09:38:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/07/11#mobile_security_update_July_2011</link>
 <description>
ZIMTO (Zeus in the Mobile) hits Android. This was long
overdue since Android now more or less is the strongest
smartphone platform. See Axelle Apvrille blog post
on &lt;a href=&quot;http://blog.fortinet.com/zitmo-hits-android/&quot;&gt;Zimto for Android&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
Android malware is really a rising trend (no secret there) but the
malware gets more and more interesting.
Mark Balanz discovered a &lt;a href=&quot;http://blog.trendmicro.com/android-malware-acts-as-an-sms-relay/&quot;&gt;malware that acts as an SMS relay&lt;/a&gt;. Such
malware has interesting possibilities to say the least.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://jailbreakme.com&quot;&gt;JailBreakMe 3.0&lt;/a&gt; was &lt;i&gt;released&lt;/i&gt; a couple
of days ago, again a nice user-level jailbreak for all iOS devices ;-) There
is a nice article from the people of the intrepidus group on how the
jailbreak works. &lt;a href=&quot;http://intrepidusgroup.com/insight/2011/07/reversing-jailbreakme-com-4/&quot;&gt;Reversing Jailbreakme.com 4.3.3&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
Conferences are all covered as far as I know. </description>
 </item>
  <item>
 <title>Mobile Security News Update June 2011 part 2</title>
 <pubDate>Mon, 20 Jun 2011 07:40:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/06/20#mobile_security_update_June_2011_p2</link>
 <description>
Not too much happened or I just missed it because I'm way to busy these days.
I'll just update my &lt;i&gt;mobile conference monitor&lt;/i&gt;.
&lt;br&gt;&lt;br&gt;
Conference:
&lt;ul&gt;
&lt;a href=&quot;https://www.blackhat.com/html/bh-us-11/bh-us-11-briefings.html&quot;&gt;Black Hat USA&lt;/a&gt; has way more mobile talks then last year. Hacking Androids for Profit by Riley Hassell. ARM exploitation ROPmap by Long Le. War Texting: Identifying and Interacting with Devices on the Telephone Network by Done Bailey. Mobile Malware Madness, and How To Cap the Mad Hatters by Neil Daswani. The Law of Mobile Privacy and Security by Jennifer Granick.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.defcon.org/html/defcon-19/dc-19-speakers.html&quot;&gt;Defcon&lt;/a&gt; is a little weak on mobile stuff this year. Only very few talks, one of the being: Mobile App Moolah: Profit taking with Mobile Malware by Jimmy Shah. 
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update June 2011</title>
 <pubDate>Wed, 08 Jun 2011 12:43:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/06/08#mobile_security_update_June_2011</link>
 <description>
There seems to be a massive rise in Android malware. Mostly modified versions
of &lt;i&gt;legit&lt;/i&gt; applications. Again one piece of malware &lt;a href=&quot;http://blog.mylookout.com/2011/06/security-alert-new-malware-found-in-alternative-android-markets-legacy/&quot;&gt;[1]&lt;/a&gt; contains a root exploit - the one already used by DroidDream. Many of the new trojans will try sending SMS messages to premium numbers. 
Other SMS trojans are just funny &lt;a href=&quot;http://blog.fortinet.com/android-smspacem-under-the-microscope/&quot;&gt;[2]&lt;/A&gt; as they send jokes to every entry in the phonebook.
&lt;br&gt;&lt;br&gt;
Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://blackhat.com/html/bh-us-11/bh-us-11-briefings.html&quot;&gt;BlackHat USA&lt;/A&gt;: Ravishankar Borgaonkar + Kevin Redon + Nico Golde: Femtocells: A poisonous needle in the operator's hay stack. Dino Dai Zovi: Apple iOS Security Evaluation: Vulnerability Analysis and Data Encryption. Stefan Esser: Exploiting the iOS Kernel. Anthony Lineberry: Don't Hate the Player, Hate the Game: Inside the Android Security Patch Lifecycle. Tyler Shields: Owning Your Phone at Every Layer - A Mobile Security Panel.&lt;br&gt;&lt;br&gt;
Don Bailey will do something on mobile infrastructure security.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.brucon.org/2011/06/confirmed-speakers-brucon-2011.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Brucon+%28Brucon%29&quot;&gt;Brucon&lt;/a&gt;: iOS Data Protection Internals by Andrey Belenko. Smart Phones - The Weak Link in the Security Chain, Hacking a network through an Android device by Nick Walker.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://2011.ninjacon.net/schedule&quot;&gt;NinjaCon / BSides vienna&lt;/a&gt;: Hacking NFC and NDEF, why I go and look at it again (by myself). A Midsummer Droid's Dream (grab a drink, come around, let's reverse some malware) by Manuel Acanthephyra.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://seattle.toorcon.org/2011/conference.php&quot;&gt;ToorCon Seattle&lt;/a&gt;: Scott Dunlop, Reverse Engineering Using the Android Emulator. Joshua Brashars, Owning the phone system (and why it still matters).
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.defcon.org/html/defcon-19/dc-19-speakers.html&quot;&gt;Defcon&lt;/a&gt;: This is REALLY not the droid you're looking for... Nicholas J. Percoco  + Sean Schulte. 
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;

Every since Google announced &lt;a href=&quot;http://www.google.com/wallet/&quot;&gt;Google wallet&lt;/a&gt; I'm getting hammered with requests regarding NFC security. Funny part about that I just was getting back working on NFC security because of the Nexus S. First bug reports already filed ;-). Due to the new rising interest in NFC and
NFC security I'll decided to give a NFC security talk at NinjaCon / BSides Vienna on June 18th.</description>
 </item>
  <item>
 <title>Mobile Security News Update May 2011</title>
 <pubDate>Tue, 10 May 2011 10:10:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/05/10#mobile_security_update_May2011</link>
 <description>
So Foursquare has started to use NFC: &lt;a href=&quot;http://mashable.com/2011/05/09/foursquare-nfc-checkins/&quot;&gt;Foursquare NFC checkin&lt;/a&gt;. This sounds like fun :-) I guess you can't seriously do harm but pranks sound possible.&lt;br&gt;&lt;br&gt;

Moxie is really cracking out cool Android stuff lately. He just released
&lt;a href=&quot;http://www.whispersys.com/whispermonitor.html&quot;&gt;WhisperMonitor&lt;/a&gt; 
a &lt;i&gt;personal firewall&lt;/i&gt; for Android. &lt;br&gt;&lt;br&gt;

Slides for the &lt;a href=&quot;http://x90.es/Lk&quot;&gt;Android Attacks&lt;/a&gt; talk from Infiltrate. Really really good and complete talk on Android security. 
&lt;br&gt;&lt;br&gt;

Academic papers:
&lt;ul&gt;
&lt;a href=&quot;http://www.usenix.org/events/sec11/tech/&quot;&gt;Usenix Security 2011&lt;/a&gt; has
a few interesting looking papers: Forensic Triage for Mobile Phones with DEC0DE
by Robert J. Walls, Erik Learned-Miller, and Brian Neil Levine, University of Massachusetts Amherst. Secure In-Band Wireless Pairing by
Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, and Dina Katabi, MIT. A Study of Android Application Security by
William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri, Pennsylvania State University.  Permission Re-Delegation: Attacks and Defenses by
Adrienne Porter Felt, University of California, Berkeley; Helen J. Wang and Alexander Moshchuk, Microsoft Research; Steve Hanna and Erika Chin, University of California, Berkeley.  
QUIRE: Lightweight Provenance for Smart Phone Operating Systems by
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, and Dan S. Wallach, Rice University.
&lt;/ul&gt;
&lt;br&gt;
Conferences:
&lt;ul&gt;
The Black Hat Vegas CFP is still running. So no talks posted yet. &lt;br&gt;
&lt;br&gt;
I spotted two talks at Virus Bulletin: &lt;a href=&quot;http://www.virusbtn.com/conference/vb2011/abstracts/Apvrille.xml&quot;&gt;An OpenBTS GSM replication jail for mobile malware by Axelle Apvrille Fortinet&lt;/a&gt; and &lt;a href=&quot;http://www.virusbtn.com/conference/vb2011/abstracts/ArmstrongMaslennikov.xml&quot;&gt;Android malware is on the rise by
Timothy Armstrong and Denis Maslennikov&lt;/a&gt;.
&lt;/ul&gt;
&lt;br&gt;
That is it for May I guess. Since I'll be either traveling or writing papers ;)
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://flattr.com/thing/54262/Mobile-Security-News&quot;&gt;
&lt;img src=&quot;http://api.flattr.com/button/button-static-50x60.png&quot;&gt;&lt;/a&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update April 2011 (part 2)</title>
 <pubDate>Tue, 26 Apr 2011 13:40:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/04/26#mobile_security_update_April_2011_p2</link>
 <description>
A nice blog post by Frank Rieger on the iPhone location logging: &lt;a href=&quot;http://frank.geekheim.de/?p=1690&quot;&gt;Was the iPhone location logging put in by quiet law-enforcement / intelligence agency request?&lt;/a&gt;&lt;br&gt;&lt;br&gt;

The talk &lt;a href=&quot;http://pa-ri.sc/z/A Million Little Tracking Devices.pdf&quot;&gt;A Million Little Tracking Devices&lt;/a&gt; by Don Bailey is really worth reading if you
are in to GSM and GSM equipped hardware.
&lt;br&gt;&lt;br&gt;

Whisper Systems (Moxie) released their Android FDE image for the Nexus One.
Try it out and go full disk crypto on your Android phone. &lt;a href=&quot;http://www.whispersys.com/whispercore.html&quot;&gt;Whispercore&lt;/a&gt;.&lt;br&gt;&lt;br&gt;

News:
&lt;ul&gt;
&lt;a href=&quot;http://www.androidpolice.com/2011/04/14/exclusive-vulnerability-in-skype-for-android-is-exposing-your-name-phone-number-chat-logs-and-a-lot-more/&quot;&gt;Skype for Android Leaks your Private Data&lt;/a&gt;. This has been fixed by now.
&lt;/ul&gt;
&lt;br&gt;

Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://www.recon.cx&quot;&gt;Recon&lt;/a&gt; has one mobile talk so far: AndBug -- A Scriptable Debugger for Android's Dalvik Virtual Machine by Scott Dunlop of IOActive 
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
In other news. I'll be in SF for Oakland 2011. I'll be there a few days before the conference so ping me if you want to meet up.</description>
 </item>
  <item>
 <title>Mobile Security News Update April 2011</title>
 <pubDate>Thu, 14 Apr 2011 07:39:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/04/14#mobile_security_update_April_2011</link>
 <description>
Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://syscan.org/index.php/sg/program&quot;&gt;SyScan Singapore&lt;/a&gt; Mobile Money is not a Ringtonea by The Grugq COSEINC; Targeting the iOS Kernel by Stefan Esser SektionEins; I'm going hunting, I'm the Hunter by Don Bailey iSEC Partners;Telecom Signaling attacks on 3G and LTE networks from SS7 to all-IP, all open by Philippe Langlois P1 Security inc.; &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.immunitysec.com/infiltrate/schedule.html&quot;&gt;Infiltrate&lt;/a&gt; Rock'm Sock'm Robots: Exploiting the Android Attack Surface by Bas Alberts and Massimiliano Oldani; &lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.sourceconference.com&quot;&gt;SourceBosten&lt;/a&gt; Secure Development Lifecycle in the Mobile World by Marc French and  Iron Mountain; Secure Development for iOS by David Thiel iSEC Partners; Tinker, Tailor, Soldier, A-GPS: How Cost Turns Security Devices Into Weapons by Don Bailey iSEC Partners. 
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://conference.hackinthebox.org/hitbsecconf2011ams/?page_id=24&quot;&gt;Hack in The Box Amsterdam&lt;/a&gt; Attacking 3G and 4G Telecommunication Networks by Enno Ray; I'm Going Hunting. I'm the Hunter. by Don Bailey; Popping Shell On A(ndroid)RM Devices by Itzhak Avrah; iPhone Data Protection in-Depth by Jean-Baptiste Bédrun; iNception Planting and Extracting Sensitive Data From Your iPhone's Subconscious by Laurent Oudot; Antid0te 2.0 - ASLR in iOS by Stefan Esser&lt;br&gt;&lt;br&gt;
 
Looks quite okay, I never attended any SourceConference but the speakers are the usual suspects :-) Infiltrate is new. I would be mostly interested to hear Don Bailey's talk but judging from the number of talks he does on the subject I guess I'll catch it at BlackHat or Defcon in summer. 
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
The mTAN trojan problem finally spread over to Europe and Germany. This version
is called &lt;a href=&quot;http://www.f-secure.com/weblog/archives/00002135.html&quot;&gt;SpyEye&lt;/a&gt; and comes as a developer signed Symbian application.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://twitter.com/#!/iamnion&quot;&gt;Nico&lt;/a&gt; and myself finally released our Tech Report on SMS filtering recommendations. It's available here: &lt;a href=&quot;https://www.mulliner.org/collin/academic/publications/counteringsmsattacks_golde_mulliner.pdf&quot;&gt;Countering SMS Attacks: Filter Recommendations&lt;/a&gt;. Feedback is welcome.
&lt;br&gt;&lt;br&gt;
I guess I missed a bunch of stuff but right now I'm kinda busy with work ;-)</description>
 </item>
  <item>
 <title>Mobile Security News Update March 2011 part 2</title>
 <pubDate>Thu, 17 Mar 2011 17:20:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/03/17#mobile_security_update_Mar2011_p3</link>
 <description>
The &lt;a href=&quot;http://www.zdnet.com/blog/security/pwn2own-2011-blackberry-falls-to-webkit-browser-attack/8401&quot;&gt;BlackBerry pwnage&lt;/a&gt; seems to cause some
trouble as RIM seems to not tell the truth (&lt;a href=&quot; http://twitter.com/#!/_snagg/status/48163899018723328&quot;&gt;1&lt;/a&gt; &lt;a href=&quot;http://twitter.com/#!/aaronportnoy/status/48401045021409280&quot;&gt;2&lt;/a&gt;) in their &lt;A href=&quot;http://www.blackberry.com/btsc/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=KB26132&quot;&gt;advisory&lt;/a&gt;. Lets see what happens here.
&lt;br&gt;&lt;br&gt;
Finally the first Android mod with encrypted storage was released by
&lt;a href=&quot;http://www.whispersys.com/whispercore.html&quot;&gt;Whisper Systems&lt;/a&gt;.
This is really really cool. Now they just need to support more Android
devices besides the Nexus S. But &lt;a href=&quot;http://twitter.com/#!/moxie__/status/48077590937878528&quot;&gt;moxie&lt;/a&gt; told me they are adding support for more soon :-)
&lt;br&gt;&lt;br&gt;
For those of you interested in NFC there are two interesting papers from this years &lt;a href=&quot;http://www.nfc-research.at/index.php?id=151#day1scientific&quot;&gt;NFC Conference&lt;/a&gt; 1) Security Vulnerabilities of the NDEF Signature Record Type 2) Practical Attacks on NFC Enabled Cell Phones. </description>
 </item>
  <item>
 <title>Mobile Security News Update March 2011 (part 1 continued)</title>
 <pubDate>Wed, 02 Mar 2011 11:08:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/03/02#mobile_security_update_Mar2011_p2</link>
 <description>
March looks busy for mobile security people ;-)
&lt;br&gt;&lt;br&gt;

Android Malware becomes serious:
&lt;a href=&quot;http://www.androidpolice.com/2011/03/01/the-mother-of-all-android-malware-has-arrived-stolen-apps-released-to-the-market-that-root-your-phone-steal-your-data-and-open-backdoor/&quot;&gt;The Mother Of All Android Malware Has Arrived: Stolen Apps Released To The Market That Root Your Phone, Steal Your Data, And Open Backdoor&lt;/a&gt;. This malware contains a root exploit. Yea, after you install the
APK it roots your device.
&lt;br&gt;&lt;br&gt;

Interesting papers (from ACM Hotmobile 2011)
&lt;ul&gt;
&lt;a href=&quot;http://www.cl.cam.ac.uk/~arb33/papers/BeresfordAREtAl-MockDroid-HotMobile2011.pdf&quot;&gt;MockDroid: trading privacy for application functionality on smart phones&lt;/a&gt; It shows a really interesting Android modification where one can selectively fake/mock unavailability of resources such as GPS or network to individual apps.
&lt;bR&gt;&lt;Br&gt;
&lt;a href=&quot;http://bojinov.org/professional/hotmobile2011-magkey-paper.pdf&quot;&gt;Mobile Token-Based Authentication on a Budget&lt;/a&gt; this is about using a cheap token to authenticate to your smart phone (using the digital compass).
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update March 2011</title>
 <pubDate>Tue, 01 Mar 2011 09:04:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/03/01#mobile_security_update_Mar2011</link>
 <description>
Very brief update, but I'm quite busy at the moment.
&lt;br&gt;&lt;br&gt;
News:
&lt;ul&gt;
&lt;a href=&quot;http://www.linuxfordevices.com/c/a/News/NetQin-and-Lookout-reports-on-Android-security/&quot;&gt;Android Trojan found in alternative app markets&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.securelist.com/en/blog/11169/Zeus_in_the_Mobile_is_back&quot;&gt;ZeuS in the Mobile is back&lt;/a&gt; (Man-in-the-Mobile now for Windows Mobile)
&lt;/ul&gt;
&lt;br&gt;
Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://www.usenix.org/events/leet11/tech/&quot;&gt;LEET'11&lt;/a&gt; has two interesting papers
on mobile malware: &lt;i&gt;Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm&lt;/i&gt; and &lt;i&gt;Andbot: Towards Advanced Mobile Botnets&lt;/i&gt;. I'm looking forward to actually read them.
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update February 2011 part 2</title>
 <pubDate>Mon, 21 Feb 2011 09:43:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/02/21#mobile_security_update_Feb2011_2</link>
 <description>
As I wrote in my last blog entry last week I attended the Mobile World Congress in Barcelona. Over all it was quite interesting, meeting old friends and
people so far I knew only through email.&lt;br&gt;&lt;br&gt;

I also had a nice chat with Elinor Mills from CNET about Visa's NFC payment
stuff at the Visa booth at MWC. Her article is here: &lt;a href=&quot;http://reviews.cnet.com/8301-13970_7-20032840-78.html?tag=topStories2&quot;&gt;Mobile phone e-wallets get closer to reality&lt;/a&gt;
&lt;br&gt;&lt;br&gt;

In two weeks Nico and I am going to speak at CanSecWest about our feature phone
SMS research. I'm really looking forward to Vancouver again.
&lt;br&gt;&lt;br&gt;
Conferences:
&lt;ul&gt;
BlackHat Europe (Barcelone): Nitesh Dhanjani talks about &lt;i&gt;New Age Attacks Against Apple's iOS (and Countermeasures)&lt;/i&gt;
&lt;br&gt;&lt;br&gt;
CanSecWest: &lt;i&gt;iPhone and iPad Hacking&lt;/i&gt; by Ilja van Sprundel, IOActive,
&lt;i&gt;Project Ubertooth: Building a Better Bluetooth Adapter&lt;/i&gt; by Michael Ossmann, U.S. Department of Commerce and Great Scott Gadgets and Nico and myself on &lt;i&gt;SMS-o-Death&lt;/i&gt;.
&lt;/ul&gt;
&lt;br&gt;
Here a collection of some &lt;a href=&quot;http://www.reddit.com/r/netsec/comments/fgetw/shmoocon_2011_video_collection/&quot;&gt;ShmooCon 2011 video recordings&lt;/a&gt;.</description>
 </item>
  <item>
 <title>Mobile Security News Update February 2011</title>
 <pubDate>Wed, 02 Feb 2011 11:23:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/02/02#mobile_security_update_Feb2011</link>
 <description>
Some comments on &lt;a href=&quot;http://www.grmn00bs.com/GeorgiaW_Smartphone_Bots_SLIDES_Shmoocon2011.pdf&quot;&gt;smartphone botnet C&amp;C over SMS from Shmoocon 2011&lt;/a&gt;: this is basically a redo of my &lt;a href=&quot;http://mulliner.org/collin/academic/publications/ibots_MALWARE2010.pdf&quot;&gt;iBots&lt;/a&gt; paper. The only difference is the implementation for Android in place of our iPhone implementation.
&lt;br&gt;&lt;br&gt;
Also from ShmooCon: &lt;a href=&quot;http://ernw.de/content/e7/e221/e1626/Shmoocon_ERNW_Attacking_mobile_telecommunication_networks_ger.pdf&quot;&gt;Attacking 3G and 4G mobile telecommunications networks&lt;/a&gt; looks quite interesting.
&lt;br&gt;&lt;br&gt;
Sadly I didn't find the slides for the other interesting talks, especially for &lt;i&gt;TEAM JOCH&lt;/i&gt; and the &lt;i&gt;mTan&lt;/i&gt; talk. Also what about the video streams from ShmooCon, were they recorded?
&lt;br&gt;&lt;br&gt;
Interesting story: &lt;a href=&quot;http://www.wired.com/threatlevel/2011/01/sms-suicide-bomber/&quot;&gt;Would-Be Suicide Bomber Killed by Unexpected SMS From Mobile Carrier&lt;/a&gt; if this is true...&lt;br&gt;
&lt;a href=&quot;http://flattr.com/thing/54262/Mobile-Security-News&quot; target=&quot;_blank&quot;&gt;
&lt;img src=&quot;http://api.flattr.com/button/button-static-50x60.png&quot; alt=&quot;Flattr this
&quot; title=&quot;Flattr this&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update January 2011 Part 2</title>
 <pubDate>Mon, 24 Jan 2011 11:08:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/01/24#mobile_security_update_Jan2011_2</link>
 <description>
Funny story on stealing SIM cards from traffic lights, Schneier has a few
nice pointers on the story: &lt;a href=&quot;http://www.schneier.com/blog/archives/2011/01/stealing_sim_ca.html&quot;&gt;here&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;

&lt;a href=&quot;https://www.eff.org/deeplinks/2011/01/dont-sacrifice-security-mobile-devices&quot;&gt;Don't Sacrifice Security on Mobile Devices&lt;/a&gt; by Chris Palmer (@ EFF) makes a nice read. Spontaneous idea: what about something like &lt;b&gt;hardened android&lt;/b&gt;?
&lt;br&gt;&lt;br&gt;

A story on &lt;a href=&quot;http://rdmag.com/News/Feeds/2011/01/information-tech-forensics-a-call-for-evidence/&quot;&gt;mobile phone forensics&lt;/a&gt;. &lt;br&gt;&lt;br&gt;

A &lt;a href=&quot;http://www.scmagazineus.com/android-trojan-sign-of-mobile-malware-evolution/marticle/194007/&quot;&gt;Android trojan with botnet-like features&lt;/a&gt;?
&lt;br&gt;&lt;br&gt;

Conferences: 
&lt;ul&gt;
The &lt;a hre=&quot;http://www.shmoocon.org/schedule&quot;&gt;ShmooCon&lt;/a&gt; schedule. The &lt;a href=&quot;http://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html&quot;&gt;BlackHat DC&lt;/a&gt; slides. A few notes to some slides. &lt;i&gt;A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications&lt;/i&gt; this is what every serious GSM hacker/security research has in his lab - no rocket science - but nice roundup for noobs and beginners. &lt;i&gt;Exploiting Smart-Phone USB Connectivity For Fun And Profit&lt;/i&gt; fun read, good job. 
&lt;/ul&gt;
&lt;br&gt;
Upcoming events for myself: Mobile World Congress, I'll be there for all four days. Catch me at &lt;i&gt;Hall: 2 Booth: H04&lt;/i&gt; (City of Berlin -&gt; Technische Universitaet Berlin and others)</description>
 </item>
  <item>
 <title>Mobile Security News Update January 2011</title>
 <pubDate>Mon, 10 Jan 2011 15:44:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2011/01/10#mobile_security_update_Jan2011</link>
 <description>
Happy new year mobile phone security enthusiasts!
&lt;br&gt;&lt;br&gt;
Conferences:
&lt;ul&gt;
&lt;a href=&quot;http://blackhat.com/html/bh-dc-11/bh-dc-11-briefings.html&quot;&gt;Black Hat DC&lt;/a&gt; 
Itzhak Avraham's talk: Popping Shell on A(ndroid)RM Devices; 
Rob Havelt, Bruno Goncalves de Oliveira: Hacking the Fast Lane: security issues with 802.11p, DSRC, and WAVE (not directly mobile phones); 
David Perez, Jose Pico talk about:
A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications;
Angelos Stavrou, Zhaohui Wang talk on:
Exploiting Smart-Phone USB Connectivity For Fun And Profit;
Ralf-Philipp Weinmann's talk on:
The Baseband Apocalypse (exploiting baseband software)
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.shmoocon.org&quot;&gt;Shmoocon&lt;/a&gt; as a number of talks but sadly no abstracts online. Also I wont be able to attend. Here are some talks that have interesting titles: Defeating mTANs for profit by Axelle Apvrille and Kyle Yang, something about smart phone botnets (the news part of the site gone now).
&lt;/ul&gt;

Bugs:
&lt;ul&gt;
On Android &lt;a href=&quot;http://code.google.com/p/android/issues/detail?id=9392&quot;&gt;SMS are intermittently sent to wrong and seemingly random contact. &lt;/a&gt; This could go bad. Not a real security bug - but a bad bad fuckup.
&lt;/ul&gt;

Finds:
&lt;ul&gt;
&lt;a href=&quot;http://www.clamtxt.com/&quot;&gt;ClamTXT&lt;/a&gt; a service for bombing mobile phones with hundreds of text messages. via &lt;a href=&quot;http://twitter.com/#!/mikkohypponen&quot;&gt;Mikko Hypponen&lt;/a&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>SMS-o-Death @ 27c3</title>
 <pubDate>Fri, 24 Dec 2010 11:25:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/12/24#smsodeath_27c3</link>
 <description>
Finally our (Nico and myself) talk &lt;a href=&quot;http://events.ccc.de/congress/2010/Fahrplan/events/4060.en.html&quot;&gt;SMS-o-Death&lt;/a&gt; is in the 27c3 schedule. The
talk will be kick ass.</description>
 </item>
  <item>
 <title>Antid0te - ASLR for the iPhone</title>
 <pubDate>Wed, 22 Dec 2010 21:50:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/12/22#antid0te</link>
 <description>
Stefan Esser of PHP Security fame released a tool called &lt;a href=&quot;http://antid0te.com/&quot;&gt;Antid0te&lt;/a&gt; to add ASLR to jailbroken iPhones.&lt;br&gt;&lt;br&gt;
This looks like really awesome work, very interesting &lt;a href=&quot;http://antid0te.com/POC2010-Adding-ASLR-To-Jailbroken-iPhones.pdf&quot;&gt;slides&lt;/a&gt;.</description>
 </item>
  <item>
 <title>Mobile Security News Update December 2010</title>
 <pubDate>Wed, 22 Dec 2010 11:36:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/12/22#mobile_security_update_Dec2010_p1</link>
 <description>
I will give a talk at the &lt;a href=&quot;http://events.ccc.de/congress/27c3/&quot;&gt;27th Chaos Communication Congress&lt;/a&gt; together with my student/colleague &lt;a href=&quot;http://nion.modprobe.de&quot;&gt;Nico Golde&lt;/a&gt; The title of our talk is &lt;i&gt;SMS-o-Death: from analyzing to attacking mobile phones on a large scale&lt;/i&gt;. The talk is
about attacking &lt;i&gt;feature phones&lt;/i&gt;. This should be very interesting
for everybody since we put quite some effort into this research and prepared
a good talk. This will be on Day-1 in Saal 1. (We are still not listed yet).
&lt;br&gt;&lt;br&gt;
I hope to see many of &lt;i&gt;you&lt;/i&gt; guys at the congress!
&lt;br&gt;&lt;br&gt;

TAC Database needed for research...
&lt;ul&gt;
recently I (and a friend of me too) was looking for a open &lt;a href=&quot;http://en.wikipedia.org/wiki/Type_Allocation_Code&quot;&gt;TAC&lt;/a&gt; database but
we could not find one. Does anybody have a hint? If nothing exists what
about a TAC database around the OpenBSC/osmocom projects?
&lt;/ul&gt;

Smartphone security paper by enisa
&lt;ul&gt;
&lt;a href=&quot;http://www.enisa.europa.eu/act/it/oar/smartphones-information-security-risks-opportunities-and-recommendations-for-users/at_download/fullReport&quot;&gt;Smartphones: Information security risks, opportunities and recommendations for users &lt;/a&gt;. In my opinion not bad but not good either. 
&lt;/ul&gt;

Past conferences:
&lt;ul&gt;
&lt;a href=&quot;http://www.powerofcommunity.net/schedule.html&quot;&gt;POC2010&lt;/a&gt; had two mobile related talks. 1) Stefan Esser, &quot;iPhone Hacking and Security(Adding ASLR to Jailbroken iPhones)&quot; and 2) Silverbug, &quot;Android Application Hacking &amp; Security Threat&quot;. Unfortunately no slides are available yet.
&lt;/ul&gt;

Fun:
&lt;ul&gt;
BBC video clip: &lt;a href=&quot;http://www.youtube.com/watch?v=kAG39jKi0lI&quot;&gt;My Blackberry Is Not Working!&lt;/a&gt; too funny.
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News Update November 2010 part 2</title>
 <pubDate>Thu, 02 Dec 2010 10:19:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/12/02#mobile_security_update_Nov2010_2</link>
 <description>
&lt;a href=&quot;http://deepsec.net&quot;&gt;DeepSec&lt;/a&gt; was real good and a lot of fun this year. Especially putting faces to email/twitter accounts. The mobile talks
were really good and there was a lot to learn and spark new project ideas ;)
&lt;br&gt;&lt;br&gt;

Quickies:
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.zdnet.com/blog/igeneration/how-to-spoof-your-geolocation-on-facebook-places-or-twitter/6764?tag=content;search-results-rivers&quot;&gt;Spoof your geolocation&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://thomascannon.net/blog/2010/11/android-data-stealing-vulnerability/&quot;&gt;Android Data Stealing Vulnerability&lt;/a&gt; thru the web browser.</description>
 </item>
  <item>
 <title>Mobile Security News Update November 2010</title>
 <pubDate>Tue, 09 Nov 2010 17:49:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/11/09#mobile_security_update_Nov2010</link>
 <description>
Kinda happy about my iBots paper, since I got two non-academic
reviews about it. &lt;a href=&quot;http://mcaf.ee/d651c&quot;&gt;1&lt;/a&gt; and
&lt;a href=&quot;http://securitywatch.eweek.com/smartphone_security/designing_smartphone_botnet_command_and_control_infrastructure.html&quot;&gt;2&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
Conferences: It is fixed that I will go to &lt;a href=&quot;http://www.deepsec.net&quot;&gt;DeepSec&lt;/a&gt; in late November. It's kind of a must since they have a strong mobile
security program this year.
&lt;br&gt;&lt;br&gt;
Unfortunately I missed &lt;a href=&quot;https://www.hashdays.ch/&quot;&gt;hashdays&lt;/a&gt; in Lucerne. This seems to be a nice event and I'll try to go next year. This reminds me
once again that we have many cool Cons here in Europe.
&lt;br&gt;&lt;br&gt;
Bugs: once again Safari on the iPhone starts voice calls without user interaction this time powered by Skype. See &lt;a href=&quot;http://www.infoworld.com/d/security-central/iphones-safari-dials-calls-without-warning-researcher-asserts-648?source=rss_security_central&quot;&gt;here&lt;/a&gt;. Very similar to the &lt;a href=&quot;http://www.mulliner.org/security/advisories/iphone_safari_phone-auto-dial_vulnerability_advisory.txt&quot;&gt;bug I found&lt;/a&gt; last year. Nice catch.
&lt;br&gt;&lt;br&gt;
In the news:
&lt;a href=&quot;http://www.shanghaidaily.com/article/?id=454047&quot;&gt;Hackers take control of 1 million mobile phones&lt;/a&gt; apparently some trojan (user installed) sent out a lot of SMS spam.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://flattr.com/thing/54262/Mobile-Security-News&quot; target=&quot;_blank&quot;&gt;
&lt;img src=&quot;http://api.flattr.com/button/button-static-50x60.png&quot; alt=&quot;Flattr this&quot; title=&quot;Flattr this&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;
</description>
 </item>
  <item>
 <title>Mobile Security News Update October 2010</title>
 <pubDate>Sun, 31 Oct 2010 14:36:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/10/31#mobile_security_update_Oct2010</link>
 <description>
I got mentioned on the McAfee blog &lt;a href=&quot;http://mcaf.ee/d651c&quot;&gt;iBots? Mobile phone network 0wnage&lt;/a&gt; for my work on smartphone botnet C&amp;C.
&lt;br&gt;&lt;br&gt;
Ralf published is awesome work on mobile/smart phone baseband attacks. The
slides to his talk &lt;i&gt;All Your Baseband are Belong to Us&lt;/i&gt; are available &lt;a href=&quot;https://cryptolux.org/media/hack.lu-aybbabtu.pdf&quot;&gt;here&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
Travel / Cons:
&lt;br&gt;&lt;br&gt;
In late November I plan to go to Vienna for DeepSec, who else is coming?
&lt;br&gt;&lt;br&gt;
In December I will be speaking at &lt;a href=&quot;http://cisco-expo.de/agenda/technologiesessions/&quot;&gt;Cisco Expo&lt;/a&gt; Germany (in Berlin). Hit me up if your coming.</description>
 </item>
  <item>
 <title>Mobile Security News Update September 2010 part 2</title>
 <pubDate>Fri, 24 Sep 2010 08:16:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/09/24#mobile_security_updates_Sep2010_2</link>
 <description>
So from now on I will include academic publications to my
news updates. I screen the stuff anyway so why keep it only for me.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.sigsac.org/ccs/CCS2010/paper_list.shtml&quot;&gt;ACM CCS&lt;/a&gt;
&lt;ul&gt;
(7) A Methodology for Empirical Analysis of the Permission-Based Security Models and its Application to Android
David Barrera, H. Gunes Kayacik, Paul C. van Oorschot, Anil Somayaji&lt;br&gt;
(8) Mobile Location Tracking in Metropolitan Areas: malnets and others
Nathanial Husted, Steve Myers&lt;br&gt;
(9) On Pairing Constrained Wireless Devices Based on Secrecy of Auxiliary Channels: The Case of Acoustic Eavesdropping
Tzipora Halevi, Nitesh Saxena&lt;br&gt;
(10) PinDr0p: Using Single-Ended Audio Features to Determine Call Provenance
Vijay A. Balasubramaniyan, Aamir Poonawalla, Mustaque Ahamad, Michael T. Hunter, Patrick Traynor 
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
A funny bug in the Nokia E72: &lt;a href=&quot;http://seclists.org/bugtraq/2010/Sep/101&quot;&gt;Nokia E72 Keyboard Password bypass&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
Conferences:
Upcoming is the &lt;a href=&quot;http://events.ccc.de/2010/07/30/27c3-we-come-in-peace-call-for-participation/&quot;&gt;27C3&lt;/a&gt; it's CFP runs until October 9th. I will try to also do a talk this year again.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://flattr.com/thing/54262/Mobile-Security-News&quot; target=&quot;_blank&quot;&gt;
&lt;img src=&quot;http://api.flattr.com/button/button-static-50x60.png&quot; alt=&quot;Flattr this&quot; title=&quot;Flattr this&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</description>
 </item>
  <item>
 <title>c't 2010/20 Risiko Smartphone</title>
 <pubDate>Sat, 11 Sep 2010 11:27:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/09/11#ct_risiko_smartphone</link>
 <description>
Together with Daniel Bachfeld from heise I wrote the artikel &lt;i&gt;Risiko Smartphone&lt;/i&gt; which will be published in the upcoming &lt;a href=&quot;http://www.heise.de/ct/inhalt/2010/20/80&quot;&gt;issue 20 of the c't magazin&lt;/a&gt; (German only). First time
mass media publication :-)</description>
 </item>
  <item>
 <title>Mobile Security News September 2010</title>
 <pubDate>Fri, 10 Sep 2010 08:54:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/09/10#mobile_security_updates_Sep2010</link>
 <description>
Mobile phone HTTP header privacy issue in Spain &lt;a href=&quot;http://certificateerror.blogspot.com/2010/08/orange-spain-disclosing-user-phone.html&quot;&gt;[1]&lt;/a&gt; xuf got them to fix it &lt;a href=&quot;http://certificateerror.blogspot.com/2010/09/orange-spain-privacy-misconfiguration.html&quot;&gt;[2]&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
In October I will present two &lt;a href=&quot;https://www.mulliner.org/collin/academic/#publications&quot;&gt;papers&lt;/a&gt;. First, &lt;b&gt;Privacy Leaks in Mobile Phone Internet Access&lt;/b&gt; which is about mobile phone HTTP header leakage. Second, &lt;b&gt;Rise of the iBots: 0wning a telco network&lt;/b&gt; a paper on smartphone botnet C&amp;C.
&lt;br&gt;&lt;br&gt;
The Osmocom people have added a &lt;a href=&quot;http://security.osmocom.org/trac/wiki/&quot;&gt;security section&lt;/a&gt; to their wiki. One really interesting part is the
section on &lt;a href=&quot;http://security.osmocom.org/trac/wiki/WillMyPhoneShowAnUnencryptetConnection?&quot;&gt;Will my Phone Show An Unencrypted Connection?&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
Conferences: &lt;a href=&quot;http://sandiego.toorcon.org/index.php?option=com_content&amp;task=section&amp;id=3&amp;Itemid=9#lineup&quot;&gt;ToorCon&lt;/a&gt; has a nice lineup sofar.
Real Men Carry Pink Pagers. The Carmen San Diego Project. iPhone Rootkit? There's an App for That. The Hidden Nemesis: Backdooring Embedded Controllers. Smartphone Ownage: The State of Mobile Botnets and Rootkits. Moving Target: Location-Based Threats and Mitigations. &lt;a href=&quot;http://blackhat.com/html/bh-ad-10/bh-ad-10-briefings.html&quot;&gt;Black Hat Abu Dhabi&lt;/a&gt; Mobile Phony: Why You Can't Trust Mobile Phone Networks For Critical Infrastructure. 
&lt;br&gt;&lt;br&gt; 
&lt;b&gt;Need some hints&lt;/b&gt;
&lt;ul&gt;
I'm looking for a number of statistics. 1) How many people update their
mobile phones (I don't care about smartphones such as iPhone or Android).
2) The most popular mobile phones around the world. There should be
some sales stats on this, right? Any help will be very welcome. Email: 
collin[at]mulliner.org
&lt;/ul&gt;
&lt;br&gt;&lt;br&gt;
The thing called a &lt;a href=&quot;http://dilbert.com/blog/entry/phone/?Page=5&quot;&gt;phone&lt;/a&gt; by Scott Adams. I almost never use it as a &lt;i&gt;phone&lt;/i&gt;.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://flattr.com/thing/54262/Mobile-Security-News&quot;&gt;
&lt;img src=&quot;http://api.flattr.com/button/button-static-50x60.png&quot;&gt;&lt;/a&gt;</description>
 </item>
  <item>
 <title>Mobile Security News August Part 3</title>
 <pubDate>Wed, 25 Aug 2010 13:07:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/08/25#mobile_security_updates_August2010_3</link>
 <description>
So since I have decided to use &lt;a href=&quot;http://flattr.com&quot;&gt;Flattr&lt;/a&gt; I also decided to put my own Thing for &lt;i&gt;Mobile Security News&lt;/i&gt; on Flattr.&lt;br&gt;&lt;br&gt;

&lt;a href=&quot;http://flattr.com/thing/54262/Mobile-Security-News&quot; target=&quot;_blank&quot;&gt;
&lt;img src=&quot;http://api.flattr.com/button/button-static-50x60.png&quot; alt=&quot;Flattr this&quot; title=&quot;Flattr this&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</description>
 </item>
  <item>
 <title>Mobile Security News August 2010 Part 2</title>
 <pubDate>Tue, 24 Aug 2010 13:09:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/08/24#mobile_security_updates_August2010_2</link>
 <description>
At &lt;A href =&quot;http://t2.fi/&quot;&gt;T2&lt;/a&gt; &lt;a href=&quot;http://t2.fi/2010/08/23/nils-to-talk-about-smart-phone-vulnerabilities/&quot;&gt;Nils talks about some WebOS and Android vulns&lt;/a&gt; this should be quite interesting since he likely will cover the bugs
he recently found. T2 is really one of the European cons I want to go to,
very high priority! Especially since I can't go to &lt;a href=&quot;http://www.sec-t.org&quot;&gt;SEC-T&lt;/a&gt; this year. &lt;a href=&quot;http://www.sec-t.org/2010/Speakers.html#kugg&quot;&gt;hacking the RKF ticket system and How to stay invisible (while still using cellphones)&lt;/a&gt; sounds quite interesting.&lt;br&gt;&lt;br&gt;
The &lt;a href=&quot;http://2010.brucon.org/index.php/Schedule&quot;&gt;BruCON&lt;/a&gt; schedule
looks quite interesting. &lt;a href=&quot;http://2010.brucon.org/index.php/Presentations#GSM_security:_fact_and_fiction&quot;&gt;GSM Security: Fact and Fiction&lt;/a&gt; &lt;a href=&quot;http://2010.brucon.org/index.php/Presentations#NFC_Malicious_Content_Sharing&quot;&gt;NFC Malicious Content sharing&lt;/a&gt;, the abstract sounds like something I've done some years ago - I wonder what kind of new stuff they found. &lt;a href=&quot;http://2010.brucon.org/index.php/Presentations#.22The_Monkey_Steals_the_Berries.22_The_State_of_Mobile_Security&quot;&gt; The Monkey Steals the Berries: The State of Mobile Security&lt;/a&gt; So BruCON actually looks quite good, another CON I need to go to at some point.
&lt;br&gt;&lt;br&gt;
At &lt;a href=&quot;http://www.sector.ca&quot;&gt;SecTor&lt;/a&gt; there seems to be a single mobile talk: &lt;a href=&quot;http://www.sector.ca/sessions.htm#Adam%20Meyers&quot;&gt;Black Berry Security FUD Free&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
Thats it for August as far as I can see.
&lt;br&gt;&lt;br&gt;
&lt;b&gt;Update:&lt;/b&gt; I totallty forgot &lt;a href=&quot;https://www.deepsec.net&quot;&gt;DeepSec&lt;/a&gt;. This year it seems like a &lt;i&gt;mobile only&lt;/i&gt; security conference. Talks are:
&lt;a href=&quot;https://deepsec.net/docs/speaker.html#PSLOT31&quot;&gt;Pentesting Internet Handheld Devices&lt;/a&gt; &lt;a href=&quot;https://deepsec.net/docs/speaker.html#PSLOT32&quot;&gt;Debugging GSM&lt;/A&gt; &lt;a href=&quot;https://deepsec.net/docs/speaker.html#PSLOT34&quot;&gt;Targeted DOS Attack and various fun with GSM Um&lt;/a&gt; &lt;a href=&quot;https://deepsec.net/docs/speaker.html#PSLOT35&quot;&gt;Mobile VoIP Steganography: From Framework to Implementation&lt;/a&gt;
&lt;a href=&quot;https://deepsec.net/docs/speaker.html#PSLOT08&quot;&gt;Mobile privacy: Tor on the iPhone and other unusual devices&lt;/a&gt; &lt;a href=&quot;https://deepsec.net/docs/speaker.html#PSLOT11&quot;&gt;OsmocomBB: A tool for GSM protocol level security analysis of GSM networks&lt;/a&gt; &lt;a href=&quot;https://deepsec.net/docs/speaker.html#PSLOT13&quot;&gt;Malicious applications for Smartphones&lt;/A&gt; &lt;a href=&quot;https://deepsec.net/docs/speaker.html#PSLOT14&quot;&gt;All your baseband are belong to us&lt;/A&gt; &lt;a href=&quot;https://deepsec.net/docs/speaker.html#PSLOT45&quot;&gt;Android: Reverse Engineering and Forensics&lt;/a&gt; &lt;a href=&quot;https://deepsec.net/docs/speaker.html#PSLOT46&quot;&gt;LTE Radio Interface structure and its security mechanism&lt;/a&gt;&lt;br&gt;</description>
 </item>
  <item>
 <title>Mobile Security News August 2010</title>
 <pubDate>Fri, 13 Aug 2010 13:06:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/08/13#mobile_security_updates_August2010</link>
 <description>
So the PalmPre seems to have a small problem with vCards? Pwn20wn Nils &lt;a href=&quot;http://www.belfasttelegraph.co.uk/lifestyle/technology-gadgets/hackers-turn-palm-pre-into-secret-bugging-device-14909790.html&quot;&gt;found a nice little bug&lt;/a&gt; that seems to be exploitable. Nice find!&lt;br&gt;
&lt;br&gt;
Then we got the &lt;a href=&quot;http://www.theregister.co.uk/2010/08/10/android_sms_trojan/&quot;&gt;first Android trojan&lt;/a&gt; that sends premium SMS messages. Jon did
a nice decode of the trojan &lt;A href=&quot;http://jon.oberheide.org/blog/2010/08/10/dexcode-teardown-of-the-android-sms-trojan/&quot;&gt;over here&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
Since this is now on a public website I want to mention it once: &lt;a href=&quot;http://srlabs.de/research/decrypting_gsm/&quot;&gt;Decrypting GSM phone calls&lt;/a&gt; by Karsten and other from the Security Research Labs (Berlin)&lt;/a&gt;&lt;br&gt;</description>
 </item>
  <item>
 <title>More Mobile Security News (in July 2010)</title>
 <pubDate>Mon, 12 Jul 2010 11:48:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/07/12#mobile_security_update_July_2010_part3</link>
 <description>
A short overview of the talk &lt;a href=&quot;http://blog.c22.cc/2010/07/11/plumberconninjacon-stay-invisible/&quot;&gt;How to stay invisible (still using cellphones)&lt;/a&gt; from PlumberCon. No slides unfortunately.
&lt;br&gt;&lt;br&gt;
Some &lt;a href=&quot;http://www.unrevoked.com/rootwiki/doku.php/public/unrevoked1_disclosure&quot;&gt;Vulnerable setuid binaries on 4G and HTC Hero&lt;/a&gt; (Android phones).
&lt;br&gt;&lt;br&gt;
Latest version of &lt;a href=&quot;http://conference.hitb.org/hitbsecconf2010ams/materials/D1T2 - R Gassira and R  Piccirillo - Hijacking Mobile Data Connections.pdf&quot;&gt;Hijacking Mobile Data Connections&lt;/a&gt; from the Mobile Security Lab guys this time with iPhone and Android. This was shown at HITB Amsterdam.
</description>
 </item>
  <item>
 <title>Mobile Security News Update July 2010 Part 2</title>
 <pubDate>Tue, 06 Jul 2010 07:37:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/07/06#mobile_security_update_July_2010_part2</link>
 <description>
The final schedule for &lt;a href=&quot;http://defcon.org&quot;&gt;Defcon&lt;/a&gt; is out - with a few more talks that should be interesting for us mobile guys. Also I kind of forgot to post some stuff because of my &lt;i&gt;feature phone rant&lt;/i&gt;.
&lt;br&gt;&lt;br&gt;
Defcon talks: &lt;i&gt;These Aren't the Permissions You're Looking For&lt;/i&gt; by some guys from Lookout. This is about Android security. &lt;i&gt;App Attack: Surviving the Mobile Application Explosion&lt;/i&gt; by the CXO guys from Lookout.
&lt;br&gt;&lt;br&gt;
Unrelated by cool: &lt;i&gt;Advanced Format String Attacks&lt;/i&gt; by Paul Haas who was
an undergrad student in the RSL at UCSB while I was there, nice!
&lt;br&gt;&lt;br&gt;
Android vs. Jon Oberheide :)
&lt;br&gt;&lt;br&gt;
Jon recently did a few cool things with Android. His &lt;a href=&quot;http://jon.oberheide.org/files/summercon10-androidhax-jonoberheide.pdf&quot;&gt;slides&lt;/a&gt; from SummerCon 2010. Two interesting blog posts about &lt;a href=&quot;http://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/&quot;&gt;Remote Kill and Install possibilities on Android&lt;/a&gt; and &lt;a href=&quot;http://jon.oberheide.org/blog/2010/06/28/a-peek-inside-the-gtalkservice-connection/&quot;&gt;some insides on the GTalkService Connection&lt;/a&gt; that is always active between your Android phone and Google. Nice reads!
&lt;br&gt;&lt;br&gt;
PS: I organized that I will be able to attend Black Hat :-) So I will get the full Vegas experience once again.</description>
 </item>
  <item>
 <title>Mobile Security News Update July 2010</title>
 <pubDate>Tue, 29 Jun 2010 15:57:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/06/29#mobile_security_update_July_2010</link>
 <description>
Most important thing: I will travel to Defcon this year. Really looking forward
to meet some people again. Ping me if you want to meet up!
&lt;br&gt;&lt;bR&gt;
More and more Defcon talks show up: &lt;i&gt;Exploitation on ARM - Technique and Bypassing Defense Mechanisms &lt;/i&gt; by Itzhak &quot;Zuk&quot; Avraham. This is a must see for me.And wow a new Bluetooth security talk, I've been waiting for this. &lt;i&gt;Breaking Bluetooth By Being Bored&lt;/i&gt; by JP Dunning. &lt;i&gt;Practical Cellphone Spying&lt;/i&gt; by Chris Paget also looks interesting. It looks like there are some more talks in the pipe that are interesting for us mobile guys.
&lt;br&gt;&lt;br&gt;
A small rant on feature phones. So we are playing with feature phones, and many of those phones don't support a full hard reset were you can erase all data. WTF??!?! Some manufactures have a PC program to flash those phones in order to restore them. But then they check the software version and don't allow you to reflash the same version. WTF!??!?!</description>
 </item>
  <item>
 <title>Mobile Security News Update June 2010</title>
 <pubDate>Wed, 09 Jun 2010 09:31:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/06/09#mobile_security_updates_June2010</link>
 <description>
Vegas update: &lt;i&gt;Carmen Sandiego is On the Run!&lt;/i&gt; by 
Don Bailey &amp; Nick DePetrillo. They seem to have updated their talk for Black Hat. Very interesting for me but not related to mobile phones: &lt;i&gt;How to Hack Millions of Routers&lt;/i&gt; by Craig Heffner. He is talking at both Black Hat and Defcon. So far only one mobile talk at Defcon: &lt;i&gt;This is not the droid you're looking for...&lt;/i&gt; by Nicholas J. Percoco and Christian Papathanasiou. 
&lt;br&gt;&lt;br&gt;
SyScan Singapore has one talk on GSM security by the Grugq (the same one he will give in Vegas).
&lt;br&gt;&lt;br&gt;
I'm still looking for a new Android device. The device closest to my needs is
a Motorola Milestone (I want a keyboard). But I really don't want to buy a
device with a closed bootloader. For sometime I considered a Nexus One even
without a keyboard, but the price is a little to high in my opinion.</description>
 </item>
  <item>
 <title>Mobile Security News May 2010 Part 2</title>
 <pubDate>Tue, 25 May 2010 09:03:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/05/25#mobile_security_update_May_2010_2</link>
 <description>
A paper on mobile phones as bugging devices:
&lt;a href=&quot;http://cs.gmu.edu/~xwangc/Publications/IFIPSec2009-Bugnet.pdf&quot;&gt;Roving Bugnet: Distributed Surveillance Threat
and Mitigation&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
Black Hat USA 2010 talks:
&lt;i&gt;Base Jumping: Attacking GSM Base Station Systems and mobile phone Base Bands&lt;/i&gt; by The Grugq. I'm really wondering about this talk. &lt;i&gt;You will be billed $90,000 for this call&lt;/i&gt; by Mikko Hypponen. This talk sounds like fun. &lt;i&gt;More Bugs In More Places: Secure Development On Moble Platforms&lt;/i&gt; by David Kane-Parry. &lt;i&gt;Attacking phone privacy&lt;/i&gt; by Karsten Nohl.
&lt;br&gt;&lt;br&gt;
Too bad that I decided to skip most cons this year. But PH-Neutral coming up
 this weekend. See u guys there!</description>
 </item>
  <item>
 <title>Mobile Security News Update May 2010</title>
 <pubDate>Tue, 18 May 2010 09:27:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/05/18#mobile_security_update_May_2010</link>
 <description>
&lt;a href=&quot;http://eusecwest.com/index.html&quot;&gt;EuSecWest&lt;/a&gt; moved to June and to Amsterdam but still looks promising. 
So far two talks look interesting: &lt;i&gt;Immature Femtocels&lt;/i&gt; by
Ravishankar Borgaonkar &amp; Kevin Redon, Technical University of Berlin and &lt;i&gt;BlackBerry Proof-of-Concept malicious applications&lt;/i&gt; by Mayank Aggarwal, SMobile Systems. I hope to see more mobile stuff at EuSec. I would really like to go but I have too many other stuff todo.
&lt;br&gt;&lt;br&gt;
Somebody claims to have found a &lt;a href=&quot;http://marienfeldt.wordpress.com/2010/03/22/iphone-business-security-framework/&quot;&gt;iPhone data protection vulnerability &lt;/a&gt;. I haven't checked it out myself.
&lt;br&gt;&lt;br&gt;
Waiting to see some of you at Ph-Neutral. Only 2 weeks to go!</description>
 </item>
  <item>
 <title>Mobile Security News April 2010 Part 2</title>
 <pubDate>Wed, 28 Apr 2010 10:37:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/04/28#mobile_security_updates_April2010_2</link>
 <description>
&lt;a href=&quot;http://2010.confidence.org.pl/agenda&quot;&gt;Confidence&lt;/a&gt; in Krakow has
a few interesting talks. Especially the &lt;i&gt;GSM/Cell Networks and telephony security&lt;/i&gt; by Don Bailey and Nick DePetrillo - this should be the stuff from
SourceBoston. &lt;i&gt;Android Reverse Engineering - Workshop&lt;/i&gt; by Jesse Burns. &lt;i&gt;Mobile attacks and preventions - how security will change the mobile market&lt;/i&gt; by Tam Hanna. And &lt;i&gt;The Four Horsemen - Malware for mobile&lt;/i&gt; by Axelle Apvrille.
&lt;br&gt;&lt;br&gt;
I'm seriously considering going there.</description>
 </item>
  <item>
 <title>Mobile Security News April 2010</title>
 <pubDate>Fri, 23 Apr 2010 08:32:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/04/23#mobile_security_updates_April2010</link>
 <description>
while going through my morning RSS feeds I stumbled across this simple but cool SMS-based attacks 
against WebOS (Palm's PRE). The attacks are
based on simple SMS text messages that contain &lt;i&gt;iframes&lt;/i&gt;. The bugs where
found in WebOS 1.3.5 and are fixed in the current version. Read the full details
on the blog of &lt;a href=&quot;http://intrepidusgroup.com/insight/2010/04/webos-examples-of-sms-delivered-injection-flaws/&quot;&gt;/intrepidus group&lt;/a&gt; the researchers who found these bugs. I especially like
the phone dialing stuff where they inject so-call GSM codes in order to switch of the GSM radio. Nice. Too bad I was a little behind with WebOS :-(
&lt;br&gt;&lt;br&gt;
Conferences: &lt;a href=&quot;http://www.sourceconference.com/index.php/boston2010&quot;&gt;SourceBoston 2010&lt;/a&gt;: &lt;a href=&quot;http://www.sourceconference.com/index.php/boston2010/sb2010-schedule#Chris_Townsend&quot;&gt;Attacking WebOS&lt;/a&gt; by Chris Clark and &lt;a href=&quot;http://www.sourceconference.com/index.php/boston2010/sb2010-schedule#Tyler&quot;&gt;Blackberry Mobile Spyware - The Monkey Steals the Berries (Part Deux)&lt;/a&gt; by Tyler Shields.
&lt;br&gt;&lt;br&gt;
As usual I call for hints and tips on interesting papers/slides/website on mobile security.
&lt;br&gt;&lt;br&gt;
Update:&lt;br&gt;&lt;br&gt;
There seems to be another mobile security related talk at SourceBoston. &lt;a href=&quot;http://www.sourceconference.com/index.php/boston2010/sb2010-schedule#Don_Nick&quot;&gt;We Found Carmen San Diego&lt;/a&gt; by Don Bailey, iSec Partners &amp; Nick DePetrillo. Reading the abstract this looks like &lt;a href=&quot;http://berlin.ccc.de/~tobias/25c3-locating-mobile-phones.pdf&quot;&gt;Locating Mobile Phones using Signalling System #7 &lt;/a&gt; by Tobias Engel at 25C3 in 2008. He also didn't have direct access to SS7 but used a web-based interface to some parts of SS7.
&lt;br&gt;&lt;br&gt;
Update 2:&lt;br&gt;&lt;br&gt;
I just got an email from Michael he discovered that WindowsMobile 6.5 is also vulnerable to
SMS messages that contain HTML and JavaScript. He posted a small advisory yesterday after reading
about the Palm Pre stuff. His advisory is here: &lt;a href=&quot;http://www.securityfocus.com/archive/1/510897/30/0/threaded&quot;&gt;XSS and Content Injection in HTC Windows Mobile SMS Preview PopUp&lt;/a&gt;.</description>
 </item>
  <item>
 <title>Random Tales of a Mobile Phone Hacker</title>
 <pubDate>Sat, 27 Mar 2010 02:02:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/03/27#random_tales_cansec</link>
 <description>
&lt;a href=&quot;http://www.cansecwest.com&quot;&gt;CanSecWest&lt;/a&gt; is just over - it was
a real nice conference and I'm looking forward to come here again.
&lt;br&gt;&lt;br&gt;
The slides for my talk &lt;i&gt;Random tales of a mobile phone hacker&lt;/i&gt; are
available &lt;a href=&quot;http://www.mulliner.org/security/feed/random_tales_mobile_hacker.pdf&quot;&gt;here&lt;/a&gt;. The most interesting part should be my mobile phone HTTP
header logging and analysis. See also this &lt;a href=&quot;http://www.computerworld.com/s/article/9174220/Is_your_mobile_phone_giving_out_your_phone_number_&quot;&gt;story&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
I've put up a test page where you can check if your operator leaks your private data such as your mobile phone number (MSISDN), IMSI (SIM card ID), or IMEI (phone hardware ID). The test page is here: &lt;a href=&quot;http://www.mulliner.org/pc.cgi&quot;&gt;www.mulliner.org/pc.cgi&lt;/a&gt;. I promise that I don't log any data when visiting this page.</description>
 </item>
  <item>
 <title>Mobile Security News March 2010</title>
 <pubDate>Tue, 09 Mar 2010 12:33:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/03/09#mobile_security_update_Mar_2010</link>
 <description>
Two stories I want to comment on:
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.fatskunk.com/solutions/our-solutions&quot;&gt;FatSkunk&lt;/a&gt; software-based attestation as a solution to mobile malware. &lt;a href=&quot;http://www.heise.de/tr/artikel/Virensuche-mit-Zufallsdaten-948104.html&quot;&gt;Article by the German Technology Review&lt;/a&gt;. They promise a lot. I don't think this will work as
advertised (I haven't seen this at work - also I can't really find a paper
about it).
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://darkreading.com/insiderthreat/security/client/showArticle.jhtml?articleID=223200001&quot;&gt;Smartphone Weather App Builds A Mobile Botnet&lt;/a&gt;. So these guys created a classic trojan application (does something very simple and useful but has a malicious part too). Of course people will download the application
from some trusted website - nothing to wonder about.
&lt;br&gt;&lt;br&gt;
Just found another mobile security talk that will be held at CanSecWest:
&lt;i&gt;Stuff we don't want on our Phones: On mobile spyware and PUPs - Jimmy Shah, McAfee, Inc&lt;/i&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Update March 9th:
&lt;ul&gt;
I forgot the &lt;a href=&quot;http://conference.hackinthebox.org&quot;&gt;Hack-in-the-Box conference&lt;/a&gt; in April in Dubai.
They have two mobile security related talks: &lt;a href=&quot;http://conference.hackinthebox.org/hitbsecconf2010dxb/?page_id=683&quot;&gt;Base Jumping: Attacking GSM Base Stations and Mobile Phone Basebands&lt;/a&gt; by the Grugq and &lt;a href=&quot;http://conference.hackinthebox.org/hitbsecconf2010dxb/?page_id=748&quot;&gt;Open Sesame: Examining Android Code with undx2&lt;/a&gt; by Marc Schoenefeld.
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News February 2010 Part 2</title>
 <pubDate>Tue, 23 Feb 2010 13:31:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/02/23#mobile_security_update_Feb2010_2</link>
 <description>
Just links...
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.gartner.com/it/page.jsp?id=1306513&quot;&gt;Gartner Says Worldwide Mobile Phone Sales to End Users Grew 8 Per Cent in Fourth Quarter 2009; Market Remained Flat in 2009&lt;/a&gt; so you know what OS/platform you want to PWN this year :-)
&lt;bR&gt;&lt;br&gt;
&lt;a href=&quot;http://neopwn.com/index.php&quot;&gt;NeoPwn = BackTrack Mobile&lt;/a&gt; &lt;a href=&quot;http://knownokia.ca/2010/02/23/neopwn-merges-with-backtrack/&quot;&gt;NeoPwn Merges with BackTrack. Produces BT Mobile for #N900&lt;/a&gt; it seems that WiFi driver for the nokia N900 (wl1251) was patched for RFMON and injection.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.subspacefield.org/~travis/android.html&quot;&gt;Android link collection&lt;/a&gt; mostly OS and security stuff
&lt;br&gt;&lt;br&gt;
...thats it!</description>
 </item>
  <item>
 <title>CanSecWest 2010</title>
 <pubDate>Wed, 17 Feb 2010 09:14:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/02/17#cansecwest2010</link>
 <description>
Yea I will be going to &lt;a href=&quot;http://www.cansecwest.com&quot;&gt;CanSecWest&lt;/a&gt; for 
the first time this year. I'll have a talk on my favorite subject: Mobile Phone Security (Random tales from a mobile phone hacker). I'm really looking forward
to this!&lt;br&gt;&lt;br&gt;
Second, there will be a &lt;a href=&quot;http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010&quot;&gt;mobile phone PWN2OWN&lt;/a&gt; again this year. They increased the cash pool for mobile devices to $60K, this looks like a statement! The devices/platforms are: iPhone (of course), BlackBerry, S60 (Nokia), Android.</description>
 </item>
  <item>
 <title>Mobile Security News February 2010</title>
 <pubDate>Tue, 02 Feb 2010 09:30:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/02/02#mobile_security_update_Feb2010</link>
 <description>
&lt;a href=&quot;http://infosecurity.ch/20100201/evidence-that-infosecurityguard-comnotrax-is-securstar-gmbh-a-fake-independent-research-on-voice-crypto/&quot;&gt;SecurStar did it again&lt;/a&gt; in 2006 there was &lt;a href=&quot;http://www.mulliner.org/blog/blosxom.cgi/index.html?find=rexspy&amp;plugin=find&amp;path=&quot;&gt;RexSpy&lt;/a&gt; and in 2010 we have this mobile phone crypto comparison. But the knowledgeable community is big enough to
identify and point out this kind of advertising/scam fast enough.
&lt;br&gt;&lt;br&gt;
Conferences, the only interesting talk I found is: &lt;a href=&quot;http://blackhat.com/html/bh-dc-10/bh-dc-10-briefings.html#Seriot&quot;&gt;iPhone Privacy&lt;/a&gt; by Nicolas Seriot at Black Hat DC this week.
&lt;br&gt;&lt;br&gt;
In other news, I still need a Nexus One. It is still not available to buy out side of the US. *ARG*
&lt;br&gt;&lt;br&gt;
Updated (Feb 2nd):
&lt;ul&gt;
Something from a few days ago: &lt;a href=&quot;http://cryptopath.wordpress.com/2010/01/29/iphone-certificate-flaws/&quot;&gt;iPhone PKI handling flaws&lt;/a&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News January 2010</title>
 <pubDate>Fri, 15 Jan 2010 10:27:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2010/01/15#mobile_security_update_Jan2010</link>
 <description>
I have been busy as hell from mid December to now, this was due to the Chaos Communication Congress (26C3), the fact that I turned 30, and some work stuff. I guess I have missed some interesting stuff in this time. So once again if you have interesting things on mobile security tell me!
&lt;bR&gt;&lt;br&gt;

Conferences, &lt;A href=&quot;http://www.shmoocon.org&quot;&gt;ShmooCon&lt;/A&gt; taks place in February (I always wanted to go - still haven't made it).
&lt;a href=&quot;http://www.shmoocon.org/presentations.html#smartphone&quot;&gt;The New World of Smartphone Security - What Your iPhone Disclosed About You&lt;/a&gt; by Trevor Hawthorn. Karsten is doing his &lt;a href=&quot;http://www.shmoocon.org/presentations-all.html#srsly&quot;&gt;GSM: srsly&lt;/a&gt; talk again. &lt;a href=&quot;http://www.shmoocon.org/presentations-all.html#btkey&quot;&gt;Bluetooth Keyboards: Who Owns Your Keystrokes?&lt;/a&gt; by Michael Ossmann, for some time I did a lot with Bluetooth keyboards so I would really like to see what they show here - especially since Michael Ossmann is one of the guys who really knows about Bluetooth. &lt;a href=&quot;http://www.shmoocon.org/presentations.html#honeym&quot;&gt;honeyM: A Framework For Virtual Mobile Device Honeyclients&lt;/a&gt; by whole bunch of Military guys (SCNR). &lt;a href=&quot;http://www.shmoocon.org/presentations.html#monkeyberry&quot;&gt;Blackberry Mobile Spyware - The Monkey Steals the Berries&lt;/a&gt; by Tyler Shields.
So it really looks like ShmooCon has some mobile security content this year.
&lt;br&gt;&lt;br&gt;
Random news:
&lt;ul&gt;
&lt;a href=&quot;http://www.hackinthebox.org/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=34605&amp;mode=thread&amp;order=0&amp;thold=0&quot;&gt;Android Phishing app in the Market&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://threatcenter.smobilesystems.com/?p=1752&quot;&gt;Study of BlackBerry Proof-of-Concept Malicious Applications&lt;/A&gt;
&lt;/ul&gt;
&lt;br&gt;

Fun find:
&lt;ul&gt;
&lt;a href=&quot;http://www.shop-alarm.de/Abhoersicheres_Handy.html&quot;&gt;Abhoersichers Handy&lt;/a&gt; (Anti eavesdropping Mobile Phone) apparently this should cost 4800 Euros. The screen shots look interesting. If anyone has any details on this device please tell me.
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News December 2009</title>
 <pubDate>Fri, 18 Dec 2009 13:06:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/12/18#mobile_security_update_Dec2009</link>
 <description>
very short update...&lt;br&gt;&lt;br&gt;

SRI published an analysis of Ikee.B here:
&lt;a href=&quot;http://www.csl.sri.com/users/porras/iPhone-Bot/&quot;&gt;www.csl.sri.com/users/porras/iPhone-Bot&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
I wrote about this stuff about a year ago &lt;a href=&quot;http://www.mulliner.org/blog/blosxom.cgi/security/jailbrokeniphonesdanger.html&quot;&gt;here&lt;/a&gt; ;-)</description>
 </item>
  <item>
 <title>Mobile Security News November 2009</title>
 <pubDate>Mon, 07 Dec 2009 09:59:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/12/07#mobile_security_update_Nov2009</link>
 <description>
so I was quite busy with various projects therefore this update
is really really late.
&lt;br&gt;&lt;br&gt;
The most interesting thing that happened recently was the 
jailbroken iPhone SSH fuck up. See: &lt;a href=&quot;http://www.wired.com/gadgetlab/2009/11/iphone-hacker/&quot;&gt;1&lt;/a&gt; and &lt;a href=&quot;http://www.f-secure.com/weblog/archives/00001814.html&quot;&gt;2&lt;/a&gt;. There are many other stories on this all over the net, also
by now this is kind of old. The interesting thing actually is that I investigated
this jailbroken iPhone SSH problem in August of this year. Including a nice statistic and some measurement. I'm planning to show this stuff together with
some other work at some conference (academic and hacker) next year (talks/papers are submitted).
&lt;br&gt;&lt;br&gt;
Conferences, I attended DeepSec in mid November, this was great fun. Including some good mobile phone security talks. At the upcoming &lt;a href=&quot;http://events.ccc.de/congress/2009/Fahrplan&quot;&gt;26C3&lt;/a&gt; there will also be a bunch of talks on mobile phone security. &lt;a href=&quot;http://events.ccc.de/congress/2009/Fahrplan/events/3600.en.html&quot;&gt;Location tracking does scale up&lt;/a&gt;, &lt;a href=&quot;http://events.ccc.de/congress/2009/Fahrplan/events/3654.en.html&quot;&gt;GSM: SRSLY?&lt;/a&gt;, &lt;a href=&quot;http://events.ccc.de/congress/2009/Fahrplan/events/3608.en.html&quot;&gt;Playing with the GSM RF Interface&lt;/a&gt;, &lt;a href=&quot;http://events.ccc.de/congress/2009/Fahrplan/events/3535.en.html&quot;&gt;Using OpenBSC for fuzzing of GSM handsets&lt;/a&gt;, and &lt;a href=&quot;http://events.ccc.de/congress/2009/Fahrplan/events/3555.en.html&quot;&gt;SCCP hacking, attacking the SS7 &amp; SIGTRAN applications one step further and mapping the phone system&lt;/a&gt;. 
&lt;br&gt;&lt;br&gt;
I actually planed to not attend 26C3 because last year kind of sucked, especially because there were way too many people. So this year I will go to some talks but not hangout at the conference. If you want to hangout during CCC give me a call or write me an email. Although my talk on SMS fuzzing was rejected I recently was asked if I would do it if they find a spot in the schedule. Of course, I would do it.
&lt;br&gt;&lt;br&gt;
Recent papers: &lt;a href=&quot;http://seriot.ch/resources/talks_papers/iPhonePrivacy.pdf&quot;&gt;iPhonePrivacy.pdf&lt;/a&gt; shows some privacy issue with the iPhone platform. Nothing really surprising, but a good read.
&lt;br&gt;&lt;br&gt;
I know I missed several things in this post but I kind of have info overkill in the last weeks. Please send me hints hints hints!!!</description>
 </item>
  <item>
 <title>Mobile Security News Update October 2009 part 2</title>
 <pubDate>Mon, 19 Oct 2009 11:22:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/10/19#mobile_security_update_Oct2009_p2</link>
 <description>
Conferences: &lt;a href=&quot;http://www.pacsec.jp&quot;&gt;PacSec 2009&lt;/a&gt; Charlie Miller is giving a talk on &lt;i&gt;iPhone SMS Fuzzing and Exploitation&lt;/i&gt;, Rich Cannings &amp; Alex Stamos are giving titled &lt;i&gt;The Android Security Story: Challenges and Solutions for Secure Open Systems&lt;/i&gt;, and Yves Younan is giving a talk on &lt;i&gt;Filter Resistant Code Injection on ARM&lt;/i&gt; (this sounds interesting). So PacSec seems to be filled with some good mobile security related talks.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Btw. the CanSecWest CfP is open now. I have something to submit but it will be complicated because of some academic conference. Let's see what happens.
&lt;br&gt;&lt;br&gt;

Bug watch:
&lt;ul&gt;
Some more PalmPre: &lt;a href=&quot;http://tlhsecurity.blogspot.com/2009/10/palm-pre-webos-version-11-floating.html&quot;&gt;Floating Point thingy in the browser&lt;/a&gt; seems to make a nice DoS.
&lt;/ul&gt;

Links:
&lt;ul&gt;
&lt;a href=&quot;http://www.hackinthebox.org/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=33341&amp;mode=thread&amp;order=0&amp;thold=0&quot;&gt;Dangers of Customized Android ROMS and Malware&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://www.zdnet.de/sicherheits_analysen_internet_per_umts_so_faelschen_deutsche_provider_webinhalte_story-39001544-41515603-1.htm&quot;&gt;Internet per UMTS: So fälschen deutsche Provider Webinhalte&lt;/a&gt; (German) &lt;br&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News October 2009</title>
 <pubDate>Tue, 06 Oct 2009 08:37:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/10/06#mobile_security_update_Oct2009</link>
 <description>
the guys from the Mobile Security Lab seem to have a lot of
time recently a couple of days ago they released a short
study on SSL on mobile phones: &lt;a href=&quot;http://www.mseclab.com/?p=180&quot;&gt;Tricks for Defeating SSL: effectiveness test on mobile phones&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
Tomorrow (7th of October) &lt;a href=&quot;http://www.hitb.org&quot;&gt;Hack-in-the-Box&lt;/a&gt;
2009 takes place in Malaysia for some reason I always forget HITB. I can't
remember ever reading a CFP or anything. They seem to have a few mobile
security related talks. Here is the &lt;a href=&quot;http://conference.hitb.org/hitbsecconf2009kl/agenda.pdf&quot;&gt;Agenda&lt;/a&gt;.
&lt;i&gt;Bugs and Kisses: Spying on BlackBerry Users for Fun&lt;/i&gt; by Sheran Gunasekera, &lt;i&gt;Side Channel Analysis on Embedded Systems&lt;/i&gt; by Job De Haas.
&lt;br&gt;&lt;br&gt;
Bug watch:
&lt;br&gt;
&lt;a href=&quot;http://tlhsecurity.blogspot.com/2009/10/palm-pre-webos-11-remote-file-access.html&quot;&gt;Palm Pre WebOS &lt;=1.1 Remote File Access Vulnerability&lt;/a&gt; 
The short description is: &lt;i&gt;The Palm Pre WebOS &lt;=1.1 suffers from a JavaScript injection attack that allows a malicious attacker to access any file on the mobile device.&lt;/i&gt; Things get more and more interesting with web stuff on smartphones.
&lt;br&gt;&lt;br&gt;
&lt;br&gt;
On October 9th the CFP ends for:&lt;br&gt; 
26C3: Here Be Dragons (26th Chaos Communication Congress)&lt;br&gt;
December 27th to 30th, 2009 in Berlin, Germany&lt;br&gt;
&lt;br&gt;
They always like mobile phone related talks, so go and submit something interesting.</description>
 </item>
  <item>
 <title>Mobile Security News September 2009 p2</title>
 <pubDate>Thu, 17 Sep 2009 08:28:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/09/17#mobile_security_update_Sep2009_2</link>
 <description>
Lets start with conferences again.
I'll be speaking at the
&lt;a href=&quot;http://www.marcusevans.com/html/speaker.asp?eventID=15641&amp;SectorID=5&amp;pageID=1&quot;&gt;5th Annual Mobile Device Management and Security Forum&lt;/a&gt; this is a more high level non-technical conference, haven't been to stuff like this
so it should be interesting. Another speaking event will be at the
&lt;a href=&quot;http://www.telekomforum.de/&quot;&gt;TelekomForum - Mobilfunktrends 2010&lt;/a&gt; in Bonn, lets see how this goes. 
&lt;br&gt;&lt;br&gt;
Michael Mueller of &lt;a href=&quot;http://www.silentservices.de&quot;&gt;silentservices.de&lt;/a&gt; found some nice SMS/MMS/Wap Push bugs in various smart phones. The bugs
allow to spoof/obfuscate the sender address/number of MMS messages. This
could be used for spam or social engineering I guess. The advisories are
&lt;a href=&quot;http://www.silentservices.de/adv03-2009.html&quot;&gt;here&lt;/a&gt; and &lt;a href=&quot;http://www.silentservices.de/adv04-2009.html&quot;&gt;here&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
The guys from the &lt;a href=&quot;http://www.mseclab.com&quot;&gt;Mobile Security Lab&lt;/a&gt; published
a primer on &lt;i&gt;Service Load (SL)&lt;/i&gt; attacks. I haven't had time to read it
yet. You can find it: &lt;a href=&quot;http://www.mseclab.com/?p=164&quot;&gt;here&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
So stuff happens in the mobile security world.</description>
 </item>
  <item>
 <title>SEC-T was real good!</title>
 <pubDate>Sun, 13 Sep 2009 10:04:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/09/13#sect_was_good</link>
 <description>
&lt;a href=&quot;http://www.sec-t.org&quot;&gt;SEC-T&lt;/a&gt; was a nice event, I had a good time.
The location was nice, the talks were good and I talked to some interesting
people.
&lt;br&gt;&lt;br&gt;
Some highlights: a reverse engineering challenge, a Wifi antenna building contest, and a bar quiz (a nerdy one). The best part, the team I was on won the quiz *G*
&lt;br&gt;&lt;br&gt;
Bonus. I had the chance to play with a Nokia N900 (the Nokia Linux smart phone). This is a sweet device.</description>
 </item>
  <item>
 <title>The latest shit from me :-)</title>
 <pubDate>Mon, 07 Sep 2009 14:00:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/09/07#latest_shit_from_me</link>
 <description>
&lt;a href=&quot;http://www.heise.de/tr/Vorsicht-ansteckend--/artikel/144520&quot;&gt;Vorsicht - ansteckend!&lt;/a&gt; (in German) something about mobile phone malware, this was even printed *G*&lt;br&gt;&lt;br&gt;
&lt;a href=http://www.youtube.com/watch?v=jUQKizf5K4g&quot;&gt;Researchers discuss iPhone, SMS bug&lt;/a&gt; Interview done by NetworkWorld at Black Hat this year.
&lt;br&gt;&lt;br&gt;
I rather should be doing slides but I don't want to right now.</description>
 </item>
  <item>
 <title>Mobile Security News September 2009</title>
 <pubDate>Wed, 02 Sep 2009 11:24:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/09/02#mobile_security_update_Sep2009</link>
 <description>
Upcoming conferences:
&lt;br&gt;&lt;br&gt;
 &lt;a href=&quot;http://www.t2.fi/schedule/2009/&quot;&gt;#T2&lt;/a&gt; in
Helsinki October 29-30 will have a two talks first &lt;a href=&quot;http://www.t2.fi/schedule/2009/#speech10&quot;&gt;Forensics on GSM phones&lt;/a&gt; by David Batanero and second
&lt;a href=&quot;http://www.t2.fi/schedule/2009/#speech11&quot;&gt;Spying via Bluetooth&lt;/a&gt; by
Jamo Niemela. Especially the talk on phone forensics would be very
interesting for me since lately the subject was brought to my attention
by multiple people. David Batanero was also scheduled to talk at
&lt;a href=&quot;http://www.sec-t.org/2009/Speakers.html&quot;&gt;SEC-T&lt;/a&gt; in September 
but his talk was cancelled, too bad since &lt;a href=&quot;http://www.mulliner.org/blog/blosxom.cgi/security/sec-t_stockholm.html&quot;&gt;I'm going to SEC-T&lt;/a&gt; but not #T2. As far as I can see my talk is the only mobile security talk at SEC-T this year.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://deepsec.net/schedule/&quot;&gt;DeepSec&lt;/a&gt; in Vienna on November 19-20 will have two mobile security talks. First &lt;a href=&quot;https://deepsec.net/docs/speaker.html#WSLOT14&quot;&gt;Hijacking Mobile Data Connections 2.0: Automated and Improved
&lt;/a&gt; by Roberto Piccirillo and  Roberto Gassir (Mobile Security Lab) and
second &lt;a href=&quot;https://deepsec.net/docs/speaker.html#WSLOT45&quot;&gt;A practical DOS attack to the GSM network&lt;/a&gt; by Dieter Spaar.
&lt;br&gt;&lt;br&gt;
Btw. I'll actually attend DeepSec this year. I'm looking forward to it since
it will be my first time at DeepSec, and Vienna is a fun city.
&lt;br&gt;&lt;br&gt;
Other interesting developments:
&lt;br&gt;&lt;br&gt;
The various GSM cracking projects seem to be taking off this time around. 
The people behind 
&lt;a href=&quot;https://svn.berlin.ccc.de/projects/airprobe/&quot;&gt;AirProbe&lt;/a&gt; and
&lt;A href=&quot;http://reflextor.com/trac/a51&quot;&gt;Creating A5/1 Rainbow Tables&lt;/a&gt;
seem to really want to build something that is easy usable. I really 
wait for the day this stuff is done and anybody with a old GSM phone
has to be worried that someone with hardware for about 100 Euros
can listen to his/her phone calls and can read his/her text messages (SMS).
&lt;br&gt;&lt;br&gt;
I recently I had a fun idea for this idea I want/need a list of
hardware that has a build-in mobile phone or GSM modem. If you know
of such hardware please tell me (collin[AT]mulliner.org or comment on this post). Please don't tell me about laptop/netbook X with a build in modem but rather
about your fridge or microwave that can call or text. &lt;b&gt;So this is a call for
hardware with embedded mobile phones!&lt;/b&gt;

</description>
 </item>
  <item>
 <title>Mobile Security News August 2009</title>
 <pubDate>Thu, 27 Aug 2009 12:16:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/08/27#mobile_security_update_August09</link>
 <description>
this blog post is long overdue, but due to traveling and catching up on work
this had to wait.&lt;br&gt;&lt;br&gt;

Black Hat USA had quite a few mobile security related talks, the slides are here: &lt;a href=&quot;http://www.blackhat.com/presentations/bh-usa-09/BURNS/BHUSA09-Burns-AndroidSurgery-SLIDES.pdf&quot;&gt;Exploratory Android Surgery&lt;/a&gt; by Jesse Burns (haven't read this yet), &lt;a href=&quot;http://www.blackhat.com/presentations/bh-usa-09/IOZZO/BHUSA09-Iozzo-iPhoneMeterpreter-SLIDES.pdf&quot;&gt;Post Exploitation Bliss: Loading Meterpreter on a Factory iPhone&lt;/a&gt; by Vincenzo Iozzo and Charlie Miller. &lt;a href=&quot;http://www.blackhat.com/presentations/bh-usa-09/LACKEY/BHUSA09-Lackey-AttackingSMS-SLIDES.pdf&quot;&gt;Attacking SMS&lt;/a&gt; by Zane Lackey and Luis Miras, &lt;a href=&quot;http://www.blackhat.com/presentations/bh-usa-09/MAHAFFEY/BHUSA09-Mahaffey-MobileFuzzing-PAPER.pdf&quot;&gt;Is Your Phone Pwned? Auditing, Attacking and Defending Mobile Devices&lt;/a&gt; (only the white paper - no slides so far) by Kevin Mahaffey and Anthony Lineberry and John Hering. The stuff for our talk Fuzzing the Phone in your Phone by Charlie Miller and myself is &lt;a href=&quot;http://www.mulliner.org/security/sms&quot;&gt;here&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
It was nice to see that Zane and Luis took my MMS research and followed some
ideas I had and made them work. Especially the part about running a your
own MMSC (MMS Server). At the point in time where I tested this it did not
work because the WAP-gateway that is configured in the MMS profile only
connects to the MMSC of the mobile operator. I tested this with multiple
US providers and some German providers in 2005/2006. I guess I have to
do some testing here in Germany to see if anything changed for our
local operators.
&lt;br&gt;&lt;br&gt;
HAR2009 had a few interesting talks too. In no particular order: &lt;a href=&quot;https://har2009.org/program/attachments/119_GSM.A51.Cracking.Nohl.pdf&quot;&gt;Cracking A5 GSM encryption&lt;/a&gt; by Karsten Nohl,
&lt;a href=&quot;https://har2009.org/program/attachments/58_SMS-ticket-hack4.pdf&quot;&gt;Public transport SMS ticket hacking&lt;/a&gt; by Pavol Luptak, &lt;a href=&quot;http://events.ccc.de/congress/2008/Fahrplan/attachments/1259_25C3-OpenBSC.pdf&quot;&gt;OpenBSC - running your own GSM network&lt;/a&gt; by Harald Welte (the slides are the same as the 25C3 slides), 
&lt;a href=&quot;&quot;&gt;Airprobe - Monitoring GSM traffic with USRP&lt;/a&gt; by Harald Welte (could not find any slides, somebody took notes and put them &lt;a href=&quot;http://c22blog.wordpress.com/2009/08/15/airprobe-monitoring-gsm-traffic-with-usrp/&quot;&gt;here&lt;/a&gt;).
&lt;br&gt;&lt;br&gt;

Did anything else happen in August? I think there was something but I can't remember. Hints welcome!</description>
 </item>
  <item>
 <title>Speaking at SEC-T</title>
 <pubDate>Thu, 20 Aug 2009 06:58:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/08/20#sec-t_stockholm</link>
 <description>
It looks like I'm going to speak at &lt;a href=&quot;http://www.sec-t.org/2009&quot;&gt;SEC-T&lt;/a&gt; in Stockholm (Sweden). I'll talk about the SMS Security Research I've done
together with Charlie Miller.&lt;br&gt;&lt;br&gt;
I'm really looking forward to go to Stockholm since I love both Sweden and Stockholm!</description>
 </item>
  <item>
 <title>USENIX Security 2009</title>
 <pubDate>Thu, 13 Aug 2009 17:45:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/08/13#usenixsecurity2009</link>
 <description>
currently I'm hanging out at &lt;a href=&quot;http://www.usenix.org/events/sec09/&quot;&gt;USENIX Security&lt;/a&gt; in Montreal. Talks are quite good and Montreal is a nice city
to visit.&lt;br&gt;&lt;br&gt;
I just found out that our paper &lt;a href=&quot;http://www.usenix.org/events/woot09/tech/full_papers/mulliner.pdf&quot;&gt;Injecting SMS Messages into Smart Phones for Security Analysis&lt;/a&gt; is already available for download. I also uploaded my slides for
the talk. It is available on my &lt;a href=&quot;/security/sms&quot;&gt;SMS Security Research&lt;/a&gt; page.</description>
 </item>
  <item>
 <title>SMS Security Research</title>
 <pubDate>Fri, 07 Aug 2009 01:45:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/08/07#sms_security_research</link>
 <description>
I just created the &lt;a href=&quot;/security/sms&quot;&gt;SMS security research&lt;/a&gt; page in order to
publish the slides from our (Charlie and myself) talk at Black Hat USA 2009 titled: &lt;i&gt;Fuzzing the Phone in your Phone&lt;/i&gt;.
&lt;br&gt;
&lt;br&gt;
The injection frameworks for the iPhone, for Android, and for Windows Mobile are available for download just now. 
Charlie provided his Sulley fuzzing test cases. The page is far from complete as we have more tools and scripts to share. But 
since I'm on vacation/business trip (depending on the actual day) I didn't find time to sort it all out.
&lt;br&gt;&lt;br&gt;
I also updated my &lt;a href=&quot;/iphone&quot;&gt;iPhone Security&lt;/a&gt; page with the link to Apple's security advisory for the
vulnerability we reported. iPhone OS 3.0.1 fixes this vulnerability.</description>
 </item>
  <item>
 <title>Mobile Security News July 2009</title>
 <pubDate>Sun, 19 Jul 2009 16:23:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/07/19#mobile_security_update_july2009</link>
 <description>
&lt;a href=&quot;http://www.darkreading.com/security/antivirus/showArticle.jhtml?articleID=218501042&amp;cid=RSSfeed&quot;&gt;SexyView&lt;/a&gt; a Symbian Virus/Worm or bot(net)? I
really don't care too much about viruses, so until this thing has a 
real control channel and can auto-update it is nothing. The one thing that
I find interesting about it is the fact that it seems to be signed. This
more or less proofs that signatures don't buy you any security. One can
always somehow obtain a signature for a piece of malware. This is as good
as having no signatures at all - well not exactly it still puts the bar
a little higher.
&lt;br&gt;&lt;br&gt;
The Windows Mobile HTC OBEX path traversal &lt;a href=&quot;http://www.seguridadmobile.com/windows-mobile/windows-mobile-security/HTC-Windows-Mobile-OBEX-FTP-Service-Directory-Traversal.html&quot;&gt;bug&lt;/a&gt; is interesting. Not because
it is new but rather that this kind of bug made it once again into a device.
So I guess no quality control at HTC. Alberto, the guy who found and 
reported the bug, told me that HTC was not really interested in communicating
with him. This is sad since HTC will also be building their own Android
devices soon. &lt;i&gt;I just read that HTC seems to offer a &lt;a href=&quot;http://www.networkworld.com/news/2009/071709-htc-issues-hotfix-for-bluetooth.html&quot;&gt;hotfix&lt;/a&gt;
for the issue.&lt;/i&gt;
&lt;br&gt;&lt;br&gt;
On a personal note. As I wrote before I'll be going to Black Hat and Defcon in Vegas. Directly after Vegas I'll travel to the Valley (Los Altos and Mountain View). Before going to Montreal for USENIX I will spend some time around Santa Barbara. So if anybody is up for some mobile phone security stuff contact me. 
&lt;br&gt;&lt;br&gt;
Otherwise see you in VEGAS!

</description>
 </item>
  <item>
 <title>Pwning Nokia phones (and other Symbian based smartphones)</title>
 <pubDate>Mon, 06 Jul 2009 12:31:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/07/06#symbian_pwning_nokia_phones</link>
 <description>
Bernhard Mueller from SEC Consult posted this fine work on Symbian
security to the full disclosure list. His white paper &lt;a href=&quot;https://www.sec-consult.com/files/SEC_Consult_Vulnerability_Lab_Pwning_Symbian_V1.03_PUBLIC.pdf&quot;&gt;Pwning Symbian&lt;/a&gt; looks interesting (I haven't actually read it completely yet).</description>
 </item>
  <item>
 <title>Mobile Security News June/July 2009</title>
 <pubDate>Fri, 03 Jul 2009 11:27:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/07/03#mobile_security_updates_June09</link>
 <description>
I guess it is time again for a news update. I actually wanted to write
one for June but I somehow forgot.
&lt;br&gt;&lt;br&gt;
Let's start with the most recent stuff. Charlie Miller partially disclosed
what we are going to talk about at &lt;a href=&quot;http://www.blackhat.com&quot;&gt;Black Hat&lt;/a&gt; at the end of the month. Sadly some reporter over hyped his story. This sucked btw! Here are the &lt;a href=&quot;http://tech.yahoo.com/news/pcworld/20090702/tc_pcworld/applepatchingserioussmsvulnerabilityoniphone&quot;&gt;original&lt;/a&gt; (over hyped) and
the &lt;a href=&quot;http://www.theregister.co.uk/2009/07/02/critical_iphone_sms_bug/&quot;&gt;actual facts&lt;/a&gt; stories.
&lt;br&gt;&lt;br&gt;
The &lt;a href=&quot;https://har2009.org/&quot;&gt;HAR2009&lt;/a&gt; program is out and there will
be some mobile phone security related talks. &lt;a href=&quot;https://har2009.org/program/events/89.en.html&quot;&gt;Public transport SMS ticket hacking&lt;/a&gt; seems to talk
about how to hack a SMS-based ticketing systems. &lt;a href=&quot;https://har2009.org/program/events/187.en.html&quot;&gt;cracking a5 gsm encryption&lt;/a&gt; will do a state
of the art talk. There will also be a &lt;a href=&quot;https://har2009.org/program/events/185.en.html&quot;&gt;OpenBSC&lt;/a&gt; talk that will show how to build and run a GSM
network based on opensource software an hardware everybody can buy. All in
all HAR seems to be quite some fun. Sadly I wont be able to go due to time
conflicts.
&lt;br&gt;&lt;br&gt;
Fun find on BugTraq: &lt;a href=&quot;http://www.securityfocus.com/archive/1/archive/1/504645/100/0/threaded&quot;&gt;Multiple Flaws in Huawei D100&lt;/a&gt;. The Huawei D100 is a
small home 3G router (&lt;a href=&quot;http://www.huawei.com/mobileweb/en/products/view.do?id=1180&quot;&gt;product page&lt;/a&gt;) that seems to be given out by some ISPs.
&lt;br&gt;&lt;br&gt;
A personal side note: I now own/have-full-access-to a BS-11 Abis GSM base station and will soon start to play around with it. Happy happy fun fun.
&lt;br&gt;</description>
 </item>
  <item>
 <title>Two NewOld Mobile Phone Advisories Posted</title>
 <pubDate>Thu, 18 Jun 2009 08:21:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/06/18#mobile_phone_advisories</link>
 <description>
I've been waiting for quite some time to publish the full details of the iPhone Safari Phone-auto-Dial vulnerability. But since Apple included it again in the just published &lt;a href=&quot;http://support.apple.com/kb/HT3639&quot;&gt;security fixes for iPhone OS 3.0&lt;/a&gt; I decided to finally
go ahead and publish the details. The examples in the advisory show only the original bug also we found some
variations of it, we didn't put any examples in the advisory.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://mulliner.org/security/advisories/iphone_safari_phone-auto-dial_vulnerability_advisory.txt&quot;&gt;iPhone Safari Phone Auto-dial Vulnerability&lt;/a&gt; also see my &lt;a href=&quot;/iphone&quot;&gt;iPhone&lt;/a&gt; page.
&lt;br&gt;&lt;br&gt;
I'm also credited, together with many others, for reporting the issue that Mail loads remote images when 
displaying HTML emails. The problem is actually a little bit bigger since also iframes are loaded. I actually
showed them a demo where I can start QuickTime from Mail without user interaction. Do I need to say more?
&lt;br&gt;&lt;br&gt;
The second advisory is about the Nokia 6212 classic an Near Field Communication mobile phone. I did a
full disclosure of the bugs at 25C3 in late December 2008 but I never published an actual advisory. I do this now.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://mulliner.org/security/advisories/nokia6212classic_uri_spoofing_and_dos_advisory.txt&quot;&gt;Nokia 6212 Classic URI Spoofing and DoS vulnerabilities&lt;/a&gt; also see my &lt;a href=&quot;/nfc&quot;&gt;NFC&lt;/a&gt; page.&lt;br&gt;</description>
 </item>
  <item>
 <title>Mobile Security News May 2009</title>
 <pubDate>Sun, 24 May 2009 17:46:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/05/24#mobile_security_updates_May09</link>
 <description>
First of all conferences. &lt;a href=&quot;http://www.eusecwest.com&quot;&gt;EUSecWest&lt;/a&gt;
is taking place the coming week in London. It will feature multiple mobile
security related presentations. First Charlie Miller and Vincent Iozzo each 
have a iPhone related talk. Second Petr Matousek will speak about
rootkits on Windows Mobile/Embedded and third Ralf-Philipp Weinmann will
talk about DECT decryption. Looks like EUSecWest will be an interesting place
to be this coming week.
&lt;br&gt;&lt;br&gt;
Right after EUSecWest &lt;a href=&quot;http://www.ph-neutral.org&quot;&gt;PH-Neutral&lt;/a&gt; is
taking place in Berlin where I will be showing of a small side project on
mobile phones and web usage. Many other interesting talks will be held as usual.
&lt;br&gt;&lt;br&gt;
Black Hat USA started to announce the speaker lineup for this year and yes
I'm one of the speakers. Together with Charlie Miller we will talk about
&lt;a href=&quot;http://blackhat.com/html/bh-usa-09/bh-usa-09-speakers.html#Miller&quot;&gt;SMS Fuzzing&lt;/a&gt;. So far Black Hat seems to become very strong on mobile phone
security this year. Jesse Burns will talk about Android, Zane Lackey and Luis Miras will also have a talk on SMS but from the description they took a different angle than Charlie and myself. John Hering from Flexilis also seems to have
gotten accepted with a mobile phone related talk that sounds very interesting &lt;a href=&quot;https://twitter.com/johnhering/status/1796318669&quot;&gt;Is your phone pwned? Auditing, attacking, and defending mobile devices&lt;/a&gt;. Last but not least Charlie Miller and Vincent Iozzo will do an iPhone talk. I actually hope for more 
mobile phone related talks, lets wait and see.
&lt;br&gt;&lt;br&gt;
The Nokia 1100 story is getting more and more annoying. In this &lt;a href=&quot;http://www.thestandard.com/news/2009/05/21/investigators-replicate-nokia-1100-online-banking-hack&quot;&gt;article&lt;/a&gt; it is reported that this company called &lt;i&gt;Ultrascan&lt;/i&gt;
replicated the SMS interception. No technical details of course. So now I'm looking for people who are interested in the topic and who would also like to
understand this and possibly replicate it.
&lt;br&gt;&lt;br&gt;
See you at PH-Neutral this weekend!
&lt;br&gt;&lt;br&gt;
Update:
&lt;ul&gt;
So it seems Google/HTC pushes Android security updates without publishing a
change log. WTF?!? Any rumors about what this is about?
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Mobile Security News April 2009 part 2</title>
 <pubDate>Tue, 28 Apr 2009 23:03:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/04/28#mobile_security_updates_April09_part2</link>
 <description>
just a quickie, the slides from BlackHat Europe are up for a few days. Here are the
slides for &lt;a href=&quot;http://blackhat.com/presentations/bh-europe-09/Gassira_Piccirillo/BlackHat-Europe-2009-Gassira-Piccirillo-Hijacking-Mobile-Data-Connections-slides.pdf&quot;&gt;Hijacking Mobile Data Connections&lt;/a&gt; and for &lt;a href=&quot;http://blackhat.com/presentations/bh-europe-09/VanBeek/BlackHat-Europe-2009-VanBeek-ePassports-Mobile-slides.pdf&quot;&gt;Passports Reloaded Goes Mobile&lt;/a&gt; (clone a RFID passport using an NFC mobile phone). So far Charlie Miller and Vincenzo Iozzo only put up 
a &lt;a href=&quot;http://blackhat.com/presentations/bh-europe-09/Miller_Iozzo/BlackHat-Europe-2009-Miller-Iozzo-OSX-IPhone-Payloads-whitepaper.pdf&quot;&gt;whitepaper&lt;/a&gt; of their OS X and iPhone talk.
&lt;br&gt;&lt;br&gt;
If you can understand German (spoken word) you might want to listen to
&lt;a href=&quot;http://chaosradio.ccc.de/cre120.html&quot;&gt;Chaosradio Express episode 120&lt;/a&gt;
 which is about &lt;a href=&quot;http://bs11-abis.gnumonks.org/trac/wiki/OpenBSC&quot;&gt;OpenBSC&lt;/a&gt; and generally about building GSM networks or actually the software to run a network in your cellar/garage.
&lt;br&gt;&lt;br&gt;
In the last week there was a short buzz about a old Nokia phone (Nokia 1100) that could be reprogrammed to &lt;i&gt;sniff&lt;/i&gt; SMS messages. The story really sounds
like a hoax since the whole subscriber ID stuff is handled through the SIM
card rather then through the phone itself. There are not many details just the
story. &lt;a href=&quot;http://www.f-secure.com/weblog/archives/00001665.html&quot;&gt;F-Secure has something in their blog about this too.&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
Yesterday the new Android version cupcake was released for developer phones,
get your cupcake while its still warm :-) Get it from &lt;a href=&quot;http://www.htc.com/www/support/android/adp.html&quot;&gt;here&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
Btw the Technology Review article citing me is only in the next issue (06.2009).</description>
 </item>
  <item>
 <title>Mobile Security News April 2009</title>
 <pubDate>Sat, 18 Apr 2009 16:01:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/04/18#mobile_security_updates_April09</link>
 <description>
&lt;a href=&quot;http://blackhat.com/html/bh-europe-09/bh-eu-09-main.html&quot;&gt;BlackHat Europe&lt;/a&gt; brought some new stuff: &lt;br&gt;&lt;br&gt;

First the guys from the &lt;a href=&quot;http://www.mseclab.com&quot;&gt;Mobile Security Lab&lt;/a&gt; showed us that the OMA provisioning functionality
can be easily abused to reconfigure the Internet connection settings
on many mobile phones. Although the attack requires some user interaction
and therefore some social engineering the attack is quite cool. 
&lt;a href=&quot;http://www.technologyreview.com/computing/22511/&quot;&gt;Technology Review&lt;/a&gt; has an article on their work. Nice Work guys!
&lt;br&gt;&lt;br&gt;
The second mobile device related piece from BlackHat Europe is that Charlie
Miller showed a workaround for the non-executable memory of the iPhone.
I haven't see the slides of his talk but &lt;a href=&quot;http://www.networkworld.com/news/2009/041609-researcher-finds-possible-bug-in.html?page=1&quot;&gt;NetworkWorld&lt;/a&gt; has an article on Charlie's iPhone find.
&lt;br&gt;&lt;br&gt;
I was interviewed by the German version of Technology Review on the subject
of smart phone security and malware. As far as I know the article citing me
should be in the current issue (05.2009).
&lt;br&gt;&lt;br&gt;
Otherwise not much happened in the world of mobile device security.</description>
 </item>
  <item>
 <title>Mobile Security News March 2009</title>
 <pubDate>Thu, 26 Mar 2009 15:24:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/03/26#mobile_security_updates_March09</link>
 <description>
few things happened besides &lt;a href=&quot;http://www.mulliner.org/blog/blosxom.cgi/security/pwn2own_mobile.html&quot;&gt;Pwn2Own&lt;/a&gt;. One thing I missed about the mobile pwn2own is that Sergio Alvarez apparently
tried to own a BlackBerry device but failed due to device/software mismatch. Hey at least he seems
to have a exploitable bug for BlackBerry, nice!
&lt;br&gt;&lt;br&gt;
Since today the slides for &lt;a href=&quot;http://cansecwest.com/csw09archive.html&quot;&gt;CanSecWest&lt;/a&gt; are
online. The mobile security stuff is here:
&lt;A href=&quot;http://cansecwest.com/csw09/csw09-alvarez.pdf&quot;&gt;1&lt;/a&gt; 
&lt;a href=&quot;http://cansecwest.com/csw09/csw09-ortega-economou.pdf&quot;&gt;2&lt;/a&gt;
&lt;a href=&quot;http://jon.oberheide.org/files/cansecwest09-android.pdf&quot;&gt;3&lt;/a&gt;
&lt;A href=&quot;http://cansecwest.com/csw09/csw09-schoenefeld.pdf&quot;&gt;4&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
At the upcoming &lt;a href=&quot;http://www.blackhat.com/html/bh-europe-09/bh-eu-09-speakers.html#Gassira&quot;&gt;BlackHat Europe&lt;/a&gt; some guys from the &lt;a href=&quot;http://www.mseclab.com&quot;&gt;Mobile Security Lab&lt;/a&gt; will give a talk on &lt;i&gt;Hijacking Mobile Data Connections &lt;/i&gt;. This sounds interesting too bad I can't go.
&lt;br&gt;&lt;br&gt;
Feedback is welcome, any good sources to recommend? Any mailing lists?</description>
 </item>
  <item>
 <title>Some notes on Pwn2Own Mobile</title>
 <pubDate>Sat, 21 Mar 2009 08:07:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/03/21#pwn2own_mobile</link>
 <description>
so it looks like &lt;a href=&quot;http://cansecwest.com/post/2009-03-18-01:00:00.PWN2OWN_Final_Rules&quot;&gt;Pwn2Own&lt;/a&gt; mobile failed the first time it was around. This is
a surprise for me. 
&lt;ul&gt;
&lt;a href=&quot;http://twitter.com/tippingpoint1/status/1362587412&quot;&gt;Pwn2Own is over, all mobile devices remain unscathed. #cansecwest&lt;/a&gt; (via Twitter)
&lt;/ul&gt;
I would have guessed that the iPhone would be have
been taken even it's Non-Exec-Memory since many more people try to
break it in comparison with the other mobile platforms.
&lt;br&gt;&lt;br&gt;
Symbian was the only &lt;i&gt;mobile&lt;/i&gt; platform somebody tried to pwn? 
&lt;ul&gt;
&lt;a href=&quot;http://twitter.com/tippingpoint1/status/1362291015&quot;&gt;#cansecwest we've got someone trying the Symbian phone now- stand bye&lt;/a&gt; (via Twitter)
&lt;/ul&gt;
This is a bigger surprise to me. Especially since Pwn2Own only offers a
Nokia N95, a device that has Non-Exec memory. I tried to closely follow
Pwn2Own mobile so when I first saw that Symbian was in the game I thought 
this will be uninteresting since they will take a brand new device with Non-Exec memory. When I read about the Nokia E61 in this &lt;a href=&quot;http://cansecwest.com/post/2009-03-04-12:00:00.Conference_Vortex_Spinning_Up&quot;&gt;announcement&lt;/a&gt; I
was really happy since this device doesn't have Non-Exec memory. In the latest
&lt;a href=&quot;http://cansecwest.com/post/2009-03-18-01:00:00.PWN2OWN_Final_Rules&quot;&gt;announcement&lt;/a&gt; the E61 seems to have been removed. Possible because
the figured out that it was way to old, bummer.
&lt;br&gt;&lt;br&gt;
I actually predicted that somebody will own the Windows Mobile device and the
Android G1 but they all survived. Maybe &lt;i&gt;all the bugs&lt;/i&gt; were already 
reported to the manufacturers before mobile pwn2own was announced so they
could not be cashed (I at least know about one case). So I guess people
will hold on to their (mobile) bugs until next year's CanSecWest/Pwn2Own.
Especially now that some well known people called for their &lt;i&gt;no more free bugs&lt;/i&gt; &lt;a href=&quot;http://search.twitter.com/search?q=no+more+free+bugs&quot;&gt;campaign&lt;/a&gt;. One last point that I found nice was that for mobile pwn2own the goal was
not necessary code execution but 1) loss of information (user data) OR 2) incur financial cost. My &lt;a href=&quot;http://www.mulliner.org/iphone&quot;&gt;iPhone phone call bug&lt;/a&gt; would probably have counted, so I guess I should also keep bugs for
myself now.
</description>
 </item>
  <item>
 <title>Mobile Security News February 2009 Part 2</title>
 <pubDate>Tue, 24 Feb 2009 09:32:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/02/24#mobile_security_updates_Feb09_part2</link>
 <description>
SIMKO2 is the new super secure smart phone for German government
officials. According to &lt;a href=&quot;http://www.heise.de/newsticker/T-Systems-praesentiert-Merkel-Phone-auf-der-CeBIT--/meldung/132699&quot;&gt;heise.de&lt;/a&gt;
the device is based on HTC touch pro and runs a hardened version of Windows Mobile. The device and all it's communication with the outside is going to be
encrypted using a micro-sd smartcard (see &lt;a href=&quot;http://erichsieht.wordpress.com/2009/02/18/schauble-chip/#more-1436&quot;&gt;here&lt;/a&gt;). Also the SIMKO2 devices
seem far from being deployed since they seem to have some performance
issues with the encryption, see &lt;a href=&quot;http://www.dradio.de/dlf/sendungen/computer/912964/&quot;&gt;here&lt;/a&gt;, also heise.de reports that the SIMKO2 devices are
&lt;i&gt;faster&lt;/i&gt; then the original touch pro. If you can read german you should check out these three links:  &lt;a href=&quot;http://www.heise.de/newsticker/T-Systems-praesentiert-Merkel-Phone-auf-der-CeBIT--/meldung/132699&quot;&gt;1&lt;/a&gt;  &lt;a href=&quot;http://erichsieht.wordpress.com/2009/02/18/schauble-chip/#more-1436&quot;&gt;2&lt;/a&gt;  &lt;a href=&quot;http://www.dradio.de/dlf/sendungen/computer/912964/&quot;&gt;3&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.f-secure.com/v-descs/trojan_symbos_yxe.shtml&quot;&gt;Sexy View&lt;/a&gt; is the first signed Symbian worm (makes it the first effective worm for S60 3rd edition).
The worm spreads through simple social engineering, it sends a SMS to every contact in the contact list of an infected phone. The SMS simply contains a URL to
the worm's SIS file on the internet. What I find interesting is the payload of the worm, since it doesn't seem to send any premium rate SMS or MMS but collects information about the phone (IMEI) and the SIM card (probably IMSI and MSISDN).
This makes me wonder what these information are being used for or maybe used for
in the future. &lt;a href=&quot;http://www.fortiguardcenter.com/advisory/FGA-2009-07.html&quot;&gt;Fortinet&lt;/a&gt; thinks that the worm could be the first step of a mobile botnet, also there is no proof yet that the worm contains any update or remote control
mechanism. This could be a really interesting thing in the near future.
&lt;br&gt;&lt;br&gt;
The mobile bug of the week is a XSS attack against a HSDPA router using SMS, see
&lt;a href=&quot;http://www.milw0rm.com/exploits/8096&quot;&gt;here&lt;/a&gt;. Like most routers
the &lt;a href=&quot;http://www.huawei.com/policy/simpleres.do?id=1063&amp;type=abouthw&quot;&gt;Huawei E960&lt;/a&gt; is controlled via a web interface. The interesting feature of the
E960 seems to be that it displays un-escaped SMS messages in the web interface and therefore can be exploited through SMS messages containing HTML and JavaScript. The attack is really funny, also I think it is quite impractical since the
victim would need to load the router configuration page in his web browser in order to trigger the
attack. Never the less this is a great attack!</description>
 </item>
  <item>
 <title>Mobile Security News February 2009</title>
 <pubDate>Thu, 12 Feb 2009 20:24:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/02/12#mobile_security_updates_Feb09</link>
 <description>
This year's &lt;a href=&quot;http://www.cansecwest.com&quot;&gt;CanSecWest&lt;/a&gt; will have a good amount of smart phone security
related talks besides the earlier announced mobile pwn2own contest. Talks seem to be focused on the iPhone
and the Android platform. 1) &lt;i&gt;Alfredo Ortega and Nico Economou - Multiplatform Iphone/Android Shellcode, and other smart phone insecurities&lt;/i&gt; 2) &lt;i&gt;Jon Oberheide - A Look at a Modern Mobile Security Model: Google's Android&lt;/i&gt; and 3) &lt;i&gt;Sergio 'shadown' Alvarez - The Smart-Phones Nightmare&lt;/i&gt;. I suppose Sergio Alvarez
is also going to talk about the iPhone since Apple fixed multiple bugs that he submitted in the iPhone 2.2 update.
I'm a bit sad that I can't attend CanSecWest.
&lt;br&gt;&lt;br&gt;
At &lt;A href=&quot;http://www.blackhat.com/html/bh-europe-09/bh-eu-09-speakers.html&quot;&gt;BlackHat Europe&lt;/a&gt; Jeroen van Beek will show his NFC-phone-based e-Passport cloning tools. Maybe there is even more mobile security stuff
going on there since the speaker list is not yet complete.
&lt;br&gt;&lt;br&gt;
Done with conferences for this post. The guys from the &lt;a href=&quot;http://www.mseclab.com/?p=133&quot;&gt;Mobile Security Lab&lt;/a&gt; just launched their &lt;a href=&quot;http://poc.mseclab.com/&quot;&gt;poc site&lt;/a&gt; where people can test their phones
using exploits developed by the mobile security lab. Nice idea!
&lt;br&gt;&lt;br&gt;
Last weekend at &lt;a href=&quot;http://www.shmoocon.org&quot;&gt;ShmooCon&lt;/a&gt; Charlie Miller released &lt;a href=&quot;http://www.ocert.org/advisories/ocert-2009-002.html&quot;&gt;details&lt;/a&gt; on a vulnerability in Android's audio player. Some links:
&lt;a href=&quot;http://arstechnica.com/open-source/news/2009/02/android-security-vulnerability-discovered.ars&quot;&gt;1&lt;/a&gt;
&lt;a href=&quot;http://www.forbes.com/2009/02/05/google-android-security-technology-security_0205_android.html&quot;&gt;2&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
Related news: Palm has finally &lt;A href=&quot;http://www.networkworld.com/news/2009/021109-palm-kills-palm-os-bets-on-webos.html?hpg1=bn&quot;&gt;killed PalmOS&lt;/a&gt;. I really waited a long time for this to happen. PalmOS was just
way past its time. This a good and sad thing but now its over.
&lt;br&gt;&lt;br&gt;
Did I miss anything?</description>
 </item>
  <item>
 <title>Mobile Security News January 2009</title>
 <pubDate>Sat, 24 Jan 2009 13:50:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/01/24#mobile_security_updates_Jan09</link>
 <description>
I just read that &lt;a href=&quot;http://cansecwest.com/post/2009-01-12.00:00:00.Pwn2Own_and_Agenda&quot;&gt;CanSecWest's Pwn2Own&lt;/a&gt; is going mobile this year. It looks like
they are going to have an iPhone, a Android (should be a G1), a Symbian,
and a Windows Mobile device too pwn and own. I wonder how the rules are going
to be for these devices. via &lt;a href=&quot;http://twitter.com/secwest/status/1144376432&quot;&gt;twitter&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
Second part. There seems to be the first mobile phone &lt;s&gt;banking&lt;/s&gt; micro payment trojan out in the
wild according to Kaspersky Labs. The trojan targets a micro payment service
that allows transfer of money and minutes between users of the service using
SMS. Another interesting part of the story is that the trojan is just a
modified version of an existing premium SMS trojan.
Stories: &lt;a href=&quot;http://www.techworld.com/security/news/index.cfm?RSS&amp;NewsID=109868&quot;&gt;1&lt;/a&gt; &lt;a href=&quot;http://blogs.zdnet.com/security/?p=2415&quot;&gt;2&lt;/a&gt;.</description>
 </item>
  <item>
 <title>NFC/NDEF Tool Update (from 25c3)</title>
 <pubDate>Thu, 15 Jan 2009 11:24:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2009/01/15#nfctools25c3</link>
 <description>
I've just uploaded the latest version of my &lt;a href=&quot;http://www.mulliner.org/nfc/&quot;&gt;NFC/NDEF&lt;/a&gt;
tools. This is the version that I presented at my talk at &lt;a href=&quot;http://events.ccc.de/congress/2008&quot;&gt;25C3&lt;/a&gt;. 
I mainly added some parsers for the new NDEF records supported by the Nokia 6212 Classic. Also included
are some bug fixes and a small fix to talk to the BtNfcAdapter running on the Nokia 6212. I further included some more attack samples and an updated version of my ndef_mifare reader/writer tool.
&lt;br&gt;&lt;br&gt;
At 25C3 I had the chance to take a look at Motorola's L7 NFC phone that is used by Deutsche Bahn 
Touch and Travel. The phone is not a real NFC phone, Motorola just replaced the battery lid with
a lid that also contains the NFC hardware (or maybe only the antenna). The only NFC functionality
the phone supports is the Touch and Travel application. What is really bad is that the user
first needs to start the application and then hold the phone up to the Touch Point. WTF? How is
this going to be a good user experience? The Nokia phones constantly scan for NFC tags and
start the appropriate application as soon as one holds the phone up to a tag.
&lt;br&gt;&lt;br&gt;
Finally I have noticed that RMV &lt;a href=&quot;http://www.mulliner.org/nfc/nfcimages/frankfurt/index.html&quot;&gt;ConTags&lt;/a&gt; are starting to appear all over the place out side Frankfurt/Main. Also they only seem to
be placed at big stations like the Darmstadt main station (Hauptbahnhof) but not inside the city.
As always I like to know about interesting new NFC services around Europe and especially Germany.</description>
 </item>
  <item>
 <title>HTC Touch vCard over IP Denial of Service</title>
 <pubDate>Fri, 19 Dec 2008 18:55:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/12/19#wincehtcudp9204vcarddos</link>
 <description>
&lt;a href=&quot;http://www.mseclab.com/wp-content/uploads/2008/12/msl-2008-002-htc_dos_vcard_ip.txt&quot;&gt;here&lt;/a&gt;
is another nice Windows Mobile (HTC) security bug that is related to WAP push. The vulnerability can
be triggered by sending vCards to port 9204/UDP over either WiFi or GPRS/UMTS. The effect seems to
be significant device slow down and/or device freezing that requires battery removal. This again reminds me
of my good all MMS Notification DoS attack.
&lt;br&gt;&lt;br&gt;
The bug was discovered by the &lt;a href=http://www.mseclab.com/&gt;Mobile Security Lab&lt;/a&gt; (who ever this is).
I hope we will see more interesting discoveries from them, they just seem to have setup their site in October.</description>
 </item>
  <item>
 <title>The Danger of Jailbroken iPhones (not really news)</title>
 <pubDate>Fri, 19 Dec 2008 13:10:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/12/19#jailbrokeniphonesdanger</link>
 <description>
first, I known I'm not the first one to write/warn about this so don't
flame me for it.&lt;br&gt;&lt;br&gt;

I recently jailbroken my iPhone so I could take a closer look at the iPhone
and it's OS. As most people I just used the &lt;a href=&quot;http://blog.iphone-dev.org/&quot;&gt;PwnageTool&lt;/a&gt; 
from the iPhone Dev-Team. It is easy, fast and just works. So
what most people forget is that the jailbroken iPhone OS comes with an
ssh server and that the &lt;i&gt;root&lt;/i&gt; and &lt;i&gt;mobile&lt;/i&gt; users have their 
password set to &lt;i&gt;alpine&lt;/i&gt; (mobile password is &lt;i&gt;dottie&lt;/i&gt;).
This basically means that everybody can log into every jailbroken iPhone
as user root. When I jailbroke my iPhone I didn't change my password right 
away since I was too busy playing with the new features and I strongly
believe that many other people never changed the password of their jailbroken
iPhone.
&lt;br&gt;&lt;br&gt;
Again the danger lies in public Wifi hotspots or any other situation
where you share Wifi with people you don't know. A good example is the
upcoming &lt;a href=&quot;http://events.ccc.de/congress/2008/&quot;&gt;Chaos Communication Congress&lt;/a&gt; 
which has one of the most hostile (wireless) networks I know.
&lt;br&gt;&lt;br&gt;
So what can happen if you leave your iPhone's password unchanged? That is
what I cooked up the last few nights.
&lt;br&gt;
&lt;br&gt;
The Basics:
&lt;ul&gt;
&lt;li&gt;Anyone can log into your iPhone as user root and/or mobile&lt;/li&gt;
&lt;li&gt;Anyone can copy files to and from your iPhone using scp&lt;/li&gt;
&lt;/ul&gt;
In further detail this means all your private data is gone, just like this:
&lt;pre&gt;
SSH_PARAMS=&quot;-q -o NumberOfPasswordPrompts=1 -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no&quot;
scp $SSH_PARAMS root@$IP:/var/mobile/Library/AddressBook/* /tmp/yourdata/
scp $SSH_PARAMS root@$IP:/var/mobile/Library/SMS/* /tmp/yourdata/
scp $SSH_PARAMS root@$IP:/var/mobile/Library/Notes/* /tmp/yourdata/
scp $SSH_PARAMS root@$IP:/var/mobile/Library/Calendar/* /tmp/yourdata/
&lt;/pre&gt;
The code shown above simply copies your Addressbook, SMS, Notes, and Calendar
from your iPhone using scp (secure copy - part of ssh). I know there is much
more to steal like: photos, email, or vpn configuration. This attack is
so simple everybody can do it without any special knowledge or tools.
&lt;br&gt;&lt;br&gt;
Getting your personal data stolen can happen to you anywhere but there is another
threat that is more likely at events like the Chaos Communication Congress, defcon,
and any other conference with a high number of jailbroken iPhones: a worm. 
&lt;br&gt;&lt;br&gt;
A worm that simply spreads using ssh/scp and the default root/mobile password can be 
written in bash (which is installed on all jailbroken iPhones) in about 4 hours.
The worm just (tries to) copies itself (a bash script) to every host on the
local wifi network in the background. Background tasks can be easily setup using
launchd. Just add a new task that runs the worm shell script every couple of minutes.
This is no big deal for anyone with just basic understanding of ssh,scp,bash, and
launchd/launchctl. I was able to do this in an evening mainly using Google to
get the appropriate launchd plist syntax. 
&lt;br&gt;&lt;br&gt;
Don't get me wrong, I don't want to encourage anyone to do all this. I just show
you how damn easy this is. So please change your root/mobile password on your
jailbroken iPhone - or somebody else will do it for you.
&lt;br&gt;&lt;br&gt;
Btw. if you are looking for &lt;a href=&quot;http://blog.wired.com/gadgets/2008/09/hacker-says-sec.html&quot;&gt;the images
that the iPhone takes about anything you do&lt;/a&gt; some of these are located here: /var/mobile/Library/Caches/Snapshots
(of course this is not new either see &lt;a href=&quot;http://blog.wired.com/gadgets/2008/09/hacker-describe.html&quot;&gt;here&lt;/a&gt;).</description>
 </item>
  <item>
 <title>NFC Paper @ ARES 2009</title>
 <pubDate>Fri, 12 Dec 2008 18:33:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/12/12#nfcpaperares09</link>
 <description>
today I submitted the camera ready version of my paper &lt;i&gt;Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones&lt;/i&gt; 
to the &lt;a href=&quot;http://www.nfc-research.at/clessec/&quot;&gt;Workshop on Sensor Security&lt;/a&gt; at &lt;a href=&quot;http://www.ares-conference.eu/conf/&quot;&gt;ARES 2009&lt;/a&gt;.
Finally a &lt;i&gt;academic&lt;/i&gt; publication again.
Done this now I'm official on Christmas vacation until &lt;a href=&quot;http://events.ccc.de/congress/2008&quot;&gt;25C3&lt;/a&gt;.</description>
 </item>
  <item>
 <title>iPhone Safari Phone Call Bug</title>
 <pubDate>Thu, 20 Nov 2008 22:39:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/11/20#iphonesafariphonecallbug</link>
 <description>
Today &lt;a href=&quot;http://www.sit.fraunhofer.de&quot;&gt;we&lt;/a&gt; published a small security
bug present in the iPhone OS until version 2.1. The bug is small but has
big impact in the way that it can be used to call arbitrary phone numbers
from visiting a website.
&lt;br&gt;&lt;br&gt;
More details including a video (but not full-disclosure) can be found here (German only):
&lt;a href=&quot;http://www.sit.fraunhofer.de/pressedownloads/pressemitteilungen/iPhoneHack.jsp&quot;&gt;www.sit.fraunhofer.de/pressedownloads/pressemitteilungen/iPhoneHack.jsp&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
We will do a full-disclosure as soon as the update is out and people had time to install it. Details will be available &lt;a href=&quot;/iphone&quot;&gt;here&lt;/a&gt;.</description>
 </item>
  <item>
 <title>NIST Guidelines on Cell Phone and PDA Security</title>
 <pubDate>Tue, 04 Nov 2008 12:11:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/11/04#nist_guidelines_on_cell_phone_and_pda_security</link>
 <description>
NIST just released their &lt;a href=&quot;http://csrc.nist.gov/publications/nistpubs/800-124/SP800-124.pdf&quot;&gt;Guidelines on Cell Phone and PDA Security&lt;/a&gt; here are some comments from my side.
&lt;br&gt;&lt;br&gt;
Overall I think the document is quite good covering the field well. My main point of
critic is the way they present their references. The document cites many &lt;i&gt;news sites&lt;/i&gt;
instead of the original publisher's site/document. Therefore some of the references are more 
or less useless since they don't provide the path to more detailed information. I not only 
write this because they quote theregister on my &lt;a href=&quot;http://www.mulliner.org/pocketpc/CollinMulliner_defcon14_pocketpcphones.pdf&quot;&gt;MMS vulnerability&lt;/a&gt; but
 also because of quoting zdnet on various other vulnerabilities rather than the original 
advisories. To make it clear I don't think the articles by these &lt;i&gt;news sites&lt;/i&gt; are bad or 
wrong, I just think people reading NIST publications expect a little more detail.</description>
 </item>
  <item>
 <title>WindowsMobile Vulnerable to WAPPush Attacks</title>
 <pubDate>Tue, 21 Oct 2008 07:11:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/10/21#windowsmobile_htc_wappush_attack</link>
 <description>
This &lt;a href=&quot;http://forum.xda-developers.com/showthread.php?t=395389&quot;&gt;post&lt;/a&gt;
in the XDA-Developers forum shows that Windows Mobile 6 on HTC devices is 
vulnerable to malicious WAP Push SI (Service Indication) and SL (Service Load) 
messages. An attacker can send a message containing a URL to an executable, the
executable will be automatically downloaded and executed WITHOUT any user 
interaction. The problem is that HTC disabled the security settings for
these kinds of WAPPush messages, normally a device should only accept
these kinds of messages from &lt;i&gt;trusted originators&lt;/i&gt; (e.g. your service
provider - don't know if I want this either).
&lt;br&gt;&lt;br&gt;
The fix to this problem is very easy as it just requires modification of
a few keys in the mobile phones registry (yes Windows Mobile has a registry).
(The steps to do this modification is described in the original advisory.) 
&lt;br&gt;&lt;br&gt;
The bug is kind of similar to one of the &lt;a href=&quot;/pocketpc&quot;&gt;MMS-based bugs&lt;/a&gt;
I discovered 2 years ago where the Windows Mobile devices would accept
WAPPush messages over UDP (WiFi).
&lt;br&gt;&lt;br&gt;
This WAPPush auto execute configuration bug
is really bad since it would allow anybody to write a very simple worm
that only needs to send WAPPush messages (SMSs) to spread. The victim
device than downloads and executes the worm binary from the Internet.
&lt;br&gt;
&lt;br&gt;
They even made a &lt;a href=&quot;http://de.youtube.com/watch?v=QhJ5SgD-bdQ&quot;&gt;demo video&lt;/a&gt;, also you don't see too much.
&lt;br&gt;
&lt;br&gt;
Some open questions from my side:&lt;br&gt;
&lt;ul&gt;
&lt;li&gt;Is it really only HTC devices?&lt;/il&gt;
&lt;li&gt;Is it only Windows Mobile 6?&lt;/li&gt;
&lt;li&gt;Does this work via WiFi (like my notiflood tool)?&lt;/li&gt;
&lt;/ul&gt;
&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://www.silentservices.de/&quot;&gt;Slientservices.de&lt;/a&gt; Author's website&lt;br&gt;
The &lt;a href=&quot;http://www.silentservices.de/adv01-2008.html&quot;&gt;Advisory&lt;/a&gt;&lt;br&gt;</description>
 </item>
  <item>
 <title>Slides for Exploiting Symbian</title>
 <pubDate>Mon, 13 Oct 2008 11:38:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/10/13#slidesexploitingsymbian</link>
 <description>
Here are &lt;a href=&quot;http://www.mulliner.org/symbian/&quot;&gt;my slides&lt;/a&gt; for my BlackHat Japan talk
Exploiting Symbian. This work was done as part of my research at &lt;a href=&quot;http://www.sit.fraunhofer.de&quot;&gt;Fraunhofer SIT&lt;/a&gt;.
If you have any questions please contact me through &lt;a href=&quot;http://private.sit.fraunhofer.de/~mulliner&quot;&gt;my website at Fraunhofer SIT&lt;/a&gt;.</description>
 </item>
  <item>
 <title>PPTP VPN for my iPhone</title>
 <pubDate>Wed, 10 Sep 2008 19:37:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/09/10#iphonevpnpptp</link>
 <description>
I just setup pptpd for my iPhone. Since I don't really trust all the application developers to think about my passwords and my privacy.
&lt;br&gt;&lt;br&gt;
I know PPTP is not the best VPN &lt;i&gt;solution&lt;/i&gt; but it works and was easy to setup.
&lt;br&gt;&lt;br&gt;
@Joe du auch wolle?</description>
 </item>
  <item>
 <title>Mifare ID Spoofer</title>
 <pubDate>Tue, 09 Sep 2008 18:24:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/09/09#mifareidspoofer</link>
 <description>
&lt;a href=&quot;http://shiftordie.de&quot;&gt;Alex&lt;/a&gt; recently got a Mifare (RFID) ID spoofing device. Last
weekend at the MRMCD111b we got to &lt;a href=&quot;http://shiftordie.de/articles/DemoTag%20works&quot;&gt;play with it&lt;/a&gt;. I'm looking forward to try it against some &lt;i&gt;real&lt;/i&gt; targets.</description>
 </item>
  <item>
 <title>Exploiting Symbian Talk @ BlackHat Japan</title>
 <pubDate>Sat, 06 Sep 2008 09:17:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/09/06#blackhatjapan2008</link>
 <description>
so looks like I'm going to BlackHat Japan in October to talk about my latest project &lt;i&gt;SymbianOS
Exploitation&lt;/i&gt;. I'm really looking forward to it since I never been to Japan and BlackHat before.
&lt;br&gt;&lt;br&gt;

BlackHat Japan &lt;a href=&quot;http://blackhat.com/html/bh-japan-08/brief-bh-jp-08-speakers.html&quot;&gt;speakers page&lt;/a&gt;
&lt;br&gt;</description>
 </item>
  <item>
 <title>Nokia 6131 NFC URI Spoofing and DoS Advisory</title>
 <pubDate>Sat, 16 Aug 2008 17:23:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/08/16#nokia6131nfcadvisory</link>
 <description>
I finally came to post the &lt;i&gt;official&lt;/i&gt; advisory &lt;a href=&quot;http://www.mulliner.org/security/advisories/nokia6131nfc_uri_spoofing_and_dos_advisory.txt&quot;&gt;Nokia 6131 NFC URI Spoofing and DoS Advisory&lt;/a&gt; to the &lt;i&gt;usual&lt;/i&gt; mailing lists in order for this thing to get into the vulnerability archives.</description>
 </item>
  <item>
 <title>Slides for BlackHat/DefCon 2008</title>
 <pubDate>Fri, 08 Aug 2008 08:56:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/08/08#bhdc2008slides</link>
 <description>
slides for for BlackHat and DefCon 2008 are already available online.
&lt;br&gt;&lt;br&gt;
Get them &lt;a href=&quot;http://164.106.251.250/docs/&quot;&gt;here&lt;/a&gt; and &lt;a href=&quot;http://michaelboman.org/blog/wp-content/uploads/2008/08/bh2008.zip&quot;&gt;here&lt;/a&gt;</description>
 </item>
  <item>
 <title>NFC Phone Tools</title>
 <pubDate>Mon, 26 May 2008 21:12:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/05/26#nfcmobilephones_eusecwest08_tools</link>
 <description>
&lt;a href=&quot;/nfc&quot;&gt;here&lt;/a&gt; are my NFC security tools this time for your
Nokia 6131 NFC. The tool set consists out of: BtNfcAdapter (a simple
NDEF reader/writer that is controllable via Bluetooth - basically turns
your 6131 NFC into a lightweight tag reader/writer), BtNfcAdapterRaw 
(Mifare Classic raw reading version of BtNfcAdapter), and MfStt (the
Mifare Sector Trailer tool, a very basic tag security checker).
&lt;br&gt;&lt;br&gt;
All the tools are for educational purposes only! They are not stable! Especially
take care when using the writing features of MfStt).
&lt;br&gt;&lt;br&gt;
Feedback is welcome as always. I also accept dumps of cool NFC tags (only including a picture of that very tag).</description>
 </item>
  <item>
 <title>Python NDEF Library </title>
 <pubDate>Sat, 24 May 2008 14:19:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/05/24#pythondeflibandtags</link>
 <description>I just uploaded the first version of my Python NDEF &lt;a href=&quot;/nfc/&quot;&gt;library&lt;/a&gt;.The library supports all &lt;i&gt;types&lt;/i&gt; standardized by the NFC-Forum until now. I
also implemented support for Nokia's Bluetooth Imaging tag and added a parser for the &lt;a href=&quot;http://www.rmv.de&quot;&gt;RMV ConTag&lt;/a&gt;. 
&lt;br&gt;&lt;br&gt;
I also uploaded some tag samples (dumps of the tag data). The dumps also include the Mifare sector trailers (if this is of interest for you).
&lt;br&gt;&lt;br&gt;
Feedback is very welcome!</description>
 </item>
  <item>
 <title>Slides for Attacking NFC Mobile Phones</title>
 <pubDate>Fri, 23 May 2008 14:51:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/05/23#nfcmobilephones_eusecwest08_slides</link>
 <description>
&lt;a href=&quot;/nfc&quot;&gt;here&lt;/a&gt; are the slides for my talk &lt;i&gt;Attacking NFC Mobile Phones&lt;/i&gt; that I gave at &lt;a href=&quot;http://www.eusecwest.com&quot;&gt;EUSecWest2008&lt;/a&gt;. The tools, libraries, examples and data dumps will be uploaded soon.</description>
 </item>
  <item>
 <title>Attacking NFC Mobile Phones @EUSecWest08</title>
 <pubDate>Wed, 23 Apr 2008 06:50:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/04/23#nfcmobilephones_eusecwest08</link>
 <description>
looks like I've been selected to give a talk at
&lt;a href=&quot;http://www.eusecwest.com/speakers.html&quot;&gt;EUSecWest&lt;/a&gt; this year. The subject
will be the security of NFC (Near Field Communication) mobile phones. 
&lt;br&gt;&lt;br&gt;
My friend &lt;a href=&quot;http://www.shiftordie.de/articles/Talk%20at%20EuSecWest%202008&quot;&gt;Alech&lt;/a&gt;
also seems to have a talk there. This should be some fun.</description>
 </item>
  <item>
 <title>RaidSonic NAS-4220 telnet root login without password</title>
 <pubDate>Tue, 18 Mar 2008 18:38:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/03/18#raidsonic_nas4220_root_telnet_nopass</link>
 <description>
another bug I found in the software of the &lt;a href=&quot;http://raidsonic.de/de/pages/products/external_cases.php?we_objectID=5051&quot;&gt;NAS-4220-B&lt;/a&gt; is that you can
use telnet to login to the NAS-4220-B as root without being ask for as password. This is possible right after boot of the device. The problem seems to originate 
from the fact that the software puts together the filesystem in ram during boot. The actual &lt;i&gt;bug&lt;/i&gt; is that telnetd is started before &lt;i&gt;/etc/passwd&lt;/i&gt; is
populated with a root account that has a password set. 

&lt;br&gt;
&lt;br&gt;

[1] &lt;a href=&quot;http://www.mulliner.org/blog/blosxom.cgi/security/raidsonic_nas4220_disk_crypt_key_leak.html&quot;&gt;raidsonic nas4220 disk crypt key leak&lt;/a&gt;&lt;br&gt;</description>
 </item>
  <item>
 <title>RaidSonic NAS-4220-B Disk Crypt Key Leaking...</title>
 <pubDate>Sun, 16 Mar 2008 12:32:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/03/16#raidsonic_nas4220_disk_crypt_key_leak</link>
 <description>
Found while playing with my NAS-4220-B last Sunday. RaidSonic didn't answer my emails so here you go.
&lt;br&gt;&lt;br&gt;
&lt;pre&gt;
--- BEGIN ADVISORY ---

Manufacturer: RaidSonic (www.raidsonic.de)
Device:       NAS-4220-B
Firmware:     2.6.0-n(2007-10-11)
Device Type:  end user grade NAS box
OS:           Linux 2.6.15
Architecture: ARM 
Designed by:  Storm Semiconductor Inc (www.storlinksemi.com)


Problem: 
 Hard disk encryption key stored in plain on unencrypted partition.


Time line:
 Found: 09. March 2008
 Reported: 09. March 2008
 Disclosed: 16. March 2008 


Summary:
 The NAS-4220-B offers disk encryption through it's web interface. The key
 used for encrypting the disk(s) is stored on a unencrypted partition.
 Therefore one can extract the encryption key by removing the disk from
 the NAS and reading the value from the unencrypted partition. The key
 itself is stored in a file in plain (base64 encoded). Therefore the 
 NAS-4220 crypt disk support can not be considered secure.


Details:
 The NAS-4220-B can hold two SATA disks. Disk are encrypted through a 
 loop back device using AES128. The problem came to my attention when
 I could access the NAS after reboot without suppling the hard disk key.
 
 The key is stored in /system/.crypt, &quot;/system&quot; is a small configuration 
 partition on the same disk that holds the encrypted partition. The system
 partition is created by the system software running on the NAS-4220. The
 configuration partition of the second hard disk is not mounted by default
 but also contains the .crypt file holding the key for the encrypted 
 partition on the same disk.


 Accessing the key (key value is the example I used):
  $ cat /system/.crypt
  MTIzNDU2Nzg5MDEyMzQ1Njc4OTA=
 
  key in plain           key in base64
  12345678901234567890   MTIzNDU2Nzg5MDEyMzQ1Njc4OTA=


 Base64 decode:
  #!/usr/bin/python
  from base64 import *
  print b64decode(&quot;MTIzNDU2Nzg5MDEyMzQ1Njc4OTA=&quot;)


Reported by:
 Collin Mulliner &lt;collin(AT)betaversion.net &gt;

--- END ADVISORY ---

&lt;/pre&gt;
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.mulliner.org/security/advisories/raidsonic_nas4220_crypt_disk_key_leak_09Mar2008.txt&quot;&gt;raidsonic_nas4220_crypt_disk_key_leak_09Mar2008.txt&lt;/a&gt;</description>
 </item>
  <item>
 <title>Breaking Disk Encryption</title>
 <pubDate>Thu, 21 Feb 2008 22:43:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/02/21#breakingdiskencryption</link>
 <description>
Some guys from Princeton &lt;i&gt;found&lt;/i&gt; a way to defeat disk encryption systems
by extracting the key from the memory of a computer/laptop. While this is
not really new (other people did that before), their way is quite cool.
They remove the RAM module from the computer and read it in a other
computer in order to do this without loosing the content of the RAM module
they freeze the RAM module and with freeze they really mean freeze. 
&lt;br&gt;&lt;br&gt;
Check out the demo video.
&lt;br&gt;&lt;br&gt;
&lt;object width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/JDaicPIgn9U&amp;rel=1&quot;&gt;&lt;/param&gt;&lt;param name=&quot;wmode&quot; value=&quot;transparent&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/JDaicPIgn9U&amp;rel=1&quot; type=&quot;application/x-shockwave-flash&quot; wmode=&quot;transparent&quot; width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;/embed&gt;&lt;/object&gt;
&lt;br&gt;
&lt;br&gt;
Their paper explains it in all details. Read it if you use disk encryption and feel safe.
&lt;br&gt;&lt;br&gt;
[1] &lt;a href=&quot;http://citp.princeton.edu/memory/&quot;&gt;Cold Boot Attacks on Encryption Keys&lt;/a&gt; (paper, video, faq, ...)</description>
 </item>
  <item>
 <title>iPhone Baseband Exploit!</title>
 <pubDate>Sat, 09 Feb 2008 17:51:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2008/02/09#iphone_baseband_exploit</link>
 <description>
Somebody or some group seems to have found a exploitable buffer overflow in the iPhone's baseband
processor. The baseband processor is the subsystem of the phone that &lt;i&gt;talks&lt;/i&gt; to the
GSM network. The overflow seems to be in the SIM Toolkit manager.
&lt;br&gt;&lt;br&gt;
The exploit lets one upload code into the baseband, so one could insert some application
into your iPhones baseband. The this &lt;i&gt;application&lt;/i&gt; would be mostly undetectable since
the memory can not be read from the application processor.
&lt;br&gt;&lt;br&gt;
Lets see what happens with this little thing...
&lt;br&gt;&lt;br&gt;
Source:
&lt;pre&gt;
From: steve 
To: gsm@lists.segfault.net
Subject: [gsm] JerrySIM -&gt; Executing shellcode on the iPhone baseband

Hi,

JerrySIM leaked yesterday. It was posted here:
http://code.google.com/p/iphone-elite/wiki/JerrySim

The exploit code has been removed shortly after but google cached it
already :/ It's out.

The program exploits a bug in the SIM Toolkit manager (which is running
on the baseband) and thus enables the execution of shellcode directly
on the baseband.

This is good work.

This has the potential to turn the iPhone into a listening device.
It still requires a lot of work and I do not know if any of the iPhone
hackers is working on it. 

regards,

steve
&lt;/pre&gt;

[1] &lt;a href=&quot;http://code.google.com/p/iphone-elite/wiki/JerrySim&quot;&gt;code.google.com/p/iphone-elite/wiki/JerrySim&lt;/a&gt;&lt;br&gt;
[2] &lt;a href=&quot;http://209.85.129.104/search?q=cache:LC51vnPimmYJ:code.google.com/p/iphone-elite/wiki/JerrySim+jerrysim&amp;hl=en&amp;ct=clnk&amp;cd=1&amp;client=firefox-a&quot;&gt;Exploit code from Google cache&lt;/a&gt;</description>
 </item>
  <item>
 <title>Anti DNS Rebinding patch for Dnsmasq from 0sec</title>
 <pubDate>Sun, 21 Oct 2007 10:25:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2007/10/21#dnsmasq_dnsrebinding_protection_patch</link>
 <description>
here is a patch for Dnsmasq (the very popular DHCP server and DNS forwarder and cache) that will prevent DNS
rebinding attacks against private networks (192.168,10.,...). The patch basically adds a filter to the forward
resolver of Dnsmasq. The filter will basically drop all private IP addresses contained in answers. Of course this
will not prevent a rebinding attack against other IP ranges like if your local network uses some public IP range.
But since Dnsmasq is mainly used for home Cable/DSL routers (like the OpenWRT-based routers) this patch should
offer sufficient protection.
&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;/collin/dnsmasq_stopdnsrebind.patch&quot;&gt;dnsmasq_stopdnsrebind.patch&lt;/a&gt; (for dnsmasq 2.40)&lt;br&gt;
&lt;br&gt;
To activate the DNS rebinding protection add &lt;b&gt;--stop-dns-rebinding&lt;/b&gt; to the dnsmasq command line.
I made it a command line option since dnsmasq is also used as a DNS cache on clients (e.g. Nokia N800) and
you still want to be able to resolve local IP addresses.
&lt;br&gt;&lt;br&gt;
&lt;br&gt;
Feedback is welcome!
&lt;br&gt;
&lt;br&gt;
Links
&lt;ul&gt;
&lt;a href=&quot;http://crypto.stanford.edu/dns/&quot;&gt;DNS rebinding&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://en.wikipedia.org/wiki/Dns_rebinding&quot;&gt;DNS rebinding (wikipedia)&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://www.doxpara.com/slides/DMK_BO2K7_Web.ppt&quot;&gt;DNS rebinding talk (by Dan Kaminsky)&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://code.google.com/p/google-dnswall/&quot;&gt;Dns-wall&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://www.thekelleys.org.uk/dnsmasq/doc.html&quot;&gt;Dnsmasq&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://openwrt.org/&quot;&gt;OpenWRT.org&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://0x736563.org/&quot;&gt;0sec&lt;/a&gt;
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Crypt Everything!</title>
 <pubDate>Wed, 12 Sep 2007 12:27:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2007/09/12#crypteverything</link>
 <description>
Last week I moved my last computer to full disk encryption (FDE if you need an acronym). The last
computer was my desktop/laptop therefore I thought it will be slightly more work since I wanted 
to have suspend to disk (aka. hibernation) - it turned out to be quite easy after all (see 1).
&lt;br&gt;
&lt;br&gt;
Previously I had setup my rented root server and my home server using a small hand build system
you can ssh to in order to &lt;i&gt;open&lt;/i&gt; the root partition and continue to boot the real system (see 2).
&lt;br&gt;
&lt;br&gt;
In the recent days I did some research on possible attacks against fully crypted
computer systems. Basically there is only one attack (if we rule out a brute force attack against
the encryption key) this is keylogging. Keylogging basically is trying to capture all key strokes
in order to obtain the passphrase for the crypted disk. Keylogging can be be done in either soft- or
hard-ware both have advantages and disadvantages for both the attacker and the victim (the owner of
the crypted disk).
&lt;br&gt;
&lt;br&gt;
&lt;i&gt;Hardware keyloggers&lt;/i&gt; basically are small devices that are plugged in between the
computer and the keyboard. The device then just logs all key strokes that it sees. The big
advantage (for the attacker) is that this is totally OS independent. The big disadvantage
for attacker of course is that he needs physical access to the victims computer twice (once
to install once to retrieve the logged data). Further the victim can more or less easily find
a hardware key logger if he cares to look for one. Also there are PCI-card based keyloggers 
(see [3]) that are probably harder to find (the computer would need to be opened). There are also
keyboards with build in keyloggers (see [4]) but I doubt that these are any good since most
people would recognize if their keyboard has suddenly changed. Of course you could also 
open up the victims keyboard and place the keylogger there, but there is always a chance that
you break the keyboard while doing this. The biggest disadvantage of hardware keyloggers is that
these can't monitor remote login sessions which can also be used to decrypt and boot a computer,
this is where software keyloggers come into play.
&lt;br&gt;&lt;br&gt;
&lt;i&gt;Software keyloggers&lt;/i&gt; come in two variants, the general kernel/driver based keylogger
that just monitors all keyboards and terminal devices (e.g. a remote session) and the
application based keylogger where a specific application is modified so that it logs some specific
or all input (e.g. the &lt;i&gt;decrypt&lt;/i&gt; command could be modified to log the passphrase). So software
keyloggers have the advantage that they can log more data (local + remote sessions) but have
the big disadvantage that the attacker needs system level access to the plain not encrypted part of the 
computer (e.g. the boot partition) in order to place the modified kernel or binaries. If the hardware
is probably secured (e.g. not booting from external disk or cdrom) the software manipulation
will take really long since the hard disk would need to be removed (or at least the PC would need to
be opened). Also this might not be possible at all if the victim always boots the computer
from an USB stick that he carries around with him at all times. In this case there wouldn't be
a plain boot partition on the PC and therefore nothing to modify. If the victim still needs
to type-in the crypto password a hardware keylogger could catch him.
&lt;br&gt;&lt;br&gt;
&lt;i&gt;Laptops seem special&lt;/i&gt; while searching for keyloggers I only found that laptops are harder
to attack since they are relatively small and therefore don't have much space to hide a hardware 
keylogger. The only thing I found was a Mini-PCI card based keylogger (see [5]) but since most
laptops have Mini-PCI wireless cards this looks quite strange? Of course you could always
disassemble the laptop to add a keylogger but this also takes a lot of time and there is
always the chance to break it. The best time to do this would be if you send your laptop
in for repair.
&lt;br&gt;&lt;br&gt;
&lt;i&gt;PDAs&lt;/i&gt; I like my Palm Tungsten T5 because it supports complete filesystem encryption. Of course
this encryption is not verifiable since the source is not open but at least it is a secure 
algorithm (AES). 
&lt;br&gt;
&lt;br&gt;
&lt;i&gt;Backups&lt;/i&gt; don't forget to encrypt your backups. Having a fully crypted PC and plain text
backup is just stupid. Good backup software should support this. 
Otherwise PGP/GPG your ZIPs/tarballs/whatever.
&lt;br&gt;
&lt;br&gt;
I would say that keylogging is only feasible under certain conditions: the attacker is extremely
knowledgeable and the victim is some how unaware. All other cases would involve a huge portion
of luck for the attacker.
&lt;br&gt;
&lt;br&gt;
[1] good starting point for crypto suspend: &lt;a href=&quot;http://www.c3l.de/linux/howto-completly-encrypted-harddisk-including-suspend-to-encrypted-disk-with-ubuntu-6.10-edgy-eft.html&quot;&gt;howto completly encrypted harddisk including suspend to encrypted disk with ubuntu&lt;/a&gt;
&lt;br&gt;
[2] small howto on: &lt;a href=&quot;http://www.mulliner.org/blog/blosxom.cgi/security/crypted_root_server.html&quot;&gt;build a crypted root server&lt;/a&gt;
&lt;br&gt;
[3] &lt;a href=&quot;http://www.keycarbon.com/products/keycarbon_pci/faq/&quot;&gt;PCI-based keylogger&lt;/a&gt;
&lt;br&gt;
[4] &lt;a href=&quot;http://amecisco.com/hkkeyboard.htm&quot;&gt;Keyboard with built in keylogger&lt;/a&gt;
&lt;br&gt;
[5] &lt;A href=&quot;http://www.keycarbon.com/products/keycarbon_laptop/overview/&quot;&gt;Mini-PCI keylogger&lt;/a&gt;
&lt;br&gt;
[6] &lt;a href=&quot;http://www.keyghost.com/USB-Keylogger.htm&quot;&gt;USB keylogger&lt;/a&gt;
&lt;br&gt;</description>
 </item>
  <item>
 <title>Marko's RexSpy Article</title>
 <pubDate>Sat, 01 Sep 2007 15:42:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2007/09/01#rexspy_article</link>
 <description>
&lt;a href=&quot;http://www.marko-rogge.de&quot;&gt;Marko Rogge&lt;/a&gt; finally published his article on RexSpy (see &lt;a href=&quot;http://www.mulliner.org/blog/blosxom.cgi/index.html?find=rexspy&amp;plugin=find&amp;path=&quot;&gt;my comments on RexSpy&lt;/a&gt;).
Marko and I talked a lot about RexSpy in order to determine if a bug/attack like Hafner described is possible at all.
&lt;br&gt;&lt;br&gt; 
The article is available as &lt;a href=&quot;http://shakal.blog.de/?p=2905376&amp;more=1&amp;page=1&quot;&gt;Blog Entry&lt;/a&gt; and &lt;a href=&quot;http://www.marko-rogge.de/rexspyartikel.pdf&quot;&gt;PDF&lt;/a&gt;
&lt;br&gt;&lt;br&gt;

One actually funny part of the whole story is that after I published  &lt;a href=&quot;http://www.mulliner.org/blog/blosxom.cgi/index.html?find=rexspy&amp;plugin=find&amp;path=&quot;&gt;my comments on RexSpy&lt;/a&gt; I got tones of emails from various people of which some seem to hope that I know
how it works. So folks tried to get more information from me (I didn't have any more information). One guy even had &lt;i&gt;product&lt;/i&gt; ideas based on this &lt;i&gt;technology&lt;/i&gt;. 
Just hilarious! &lt;br&gt;</description>
 </item>
  <item>
 <title>Crypted Root Server</title>
 <pubDate>Wed, 02 May 2007 22:13:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2007/05/02#crypted_root_server</link>
 <description>
some time ago I setup a new root server for a new project of a friend and myself, this time I wanted to
go full crypto. In the beginning I thought this might be a lot of work but as it turned out it is quite simple
if you do some thinking.
&lt;br&gt;&lt;br&gt;
There are many ways to do this, this is how I did it.
&lt;br&gt;&lt;br&gt;
The setup works like this: the server boots into a minimal system starting only the SSH daemon. The you login
and enter/upload the passphrase to unlock the disk(s). Finally you tell the system that you are done, after
which you are kicked out and the system completes the boot by mouting the real root partition and executing
init from there. At this point everything is as usual.
&lt;br&gt;&lt;br&gt;
There are two basic parts in this setup: first building a good minimal system so you don't waste too much 
space and second build the init script for the minimal system. 
&lt;br&gt;&lt;br&gt;
The minimal system needs to contain stuff like:
sshd, filesystem tools such as mkfs, fsck, fdisk, etc., cryptsetup, networking tools like ifconfig, route,
ip, etc., mdadm (if you run raid), and of course all the required libraries. The easiest way to do this
is using the recovery tool your hoster provides. Just setup a minimal system on one partition and strip it down
before moving it to the boot partition.
&lt;br&gt;&lt;br&gt;
The init script is quite simple, it needs to do three things: first, configure the network (ip address and
route); second, start sshd; and third, start the actual system after the root partition has been unlocked.
My script works as follows: after sshd has been started the script waits for a file to be created in the
tmp directory. As soon as the file is created all ssh processes are killed, and the real system is booted.
&lt;br&gt;&lt;br&gt;
&lt;br&gt;
Files:
&lt;ul&gt;
&lt;a href=&quot;/collin/crypto_root_ssh_file_list.txt&quot;&gt;file list&lt;/a&gt; of my minimal system&lt;br&gt;
&lt;a href=&quot;/collin/crypto_root_ssh_init.txt&quot;&gt;init script&lt;/a&gt; for minimal system (touch /tmp/READY_TO_BOOT after
you unlocked the root partition)&lt;br&gt;
&lt;/ul&gt;
&lt;br&gt;
&lt;br&gt;
Some notes:
&lt;ul&gt;
You need to encrypt your swap otherwise this is useless!&lt;br&gt;
If you upload a key to your minimal system only upload to key to a ram drive, never write it to disk. Otherwise 
all the work is useless!&lt;br&gt;
Remember your key! Remember your key! Remember your key!
&lt;/ul&gt;
&lt;br&gt;
&lt;br&gt;
Todo:
&lt;ul&gt;
Filesystem integrity check for the minimal system. This is a very hard task and I don't have a solution so far.
&lt;/ul&gt;</description>
 </item>
  <item>
 <title>Aircrack-ptw cracks WEP in 19 Seconds on my N800</title>
 <pubDate>Tue, 03 Apr 2007 18:57:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2007/04/03#newattackonwep2</link>
 <description>
I just benchmarked &lt;a href=&quot;http://www.mulliner.org/blog/blosxom.cgi/security/newattackonwep.html&quot;&gt;Aircrack-ptw&lt;/a&gt; on
my Nokia N800 (ARMv6 320Mhz) and it finished in 19 seconds. Sadly enough the wireless packet injection doesn't work on
the N800/770. 19 Seconds is quite impressive.</description>
 </item>
  <item>
 <title>Breaking 104 bit WEP in less then 60 Seconds</title>
 <pubDate>Tue, 03 Apr 2007 17:44:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2007/04/03#newattackonwep</link>
 <description>
&lt;a href=&quot;http://www.cdc.informatik.tu-darmstadt.de/mitarbeiter/e_tews.html&quot;&gt;Erik Tews&lt;/a&gt; with the help
of two others published a new attack on WEP called: &lt;b&gt;Breaking 104 bit WEP in less then 60 Seconds&lt;/b&gt;.
&lt;br&gt;
&lt;br&gt;
Like the older attacks on WEP this attack uses sniffed IVs in order to break/compute/crack the WEP key. 
The nice thing about this attack is that it only needs between 40.000 and 85.000 unique IVs (older attacks
needed between 250.000 and 1.000.000 in order to succeed).
This already reduces the overall attack time since one needs to capture less packages. But the
attack also uses a new/other attack on RC4 which further improves the speed. The paper gives an average of 
3 seconds on 1.7Ghz Pentium-M. The attack even works with 5000 keys.
&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://eprint.iacr.org/2007/120.pdf&quot;&gt;Paper&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://www.cdc.informatik.tu-darmstadt.de/aircrack-ptw/&quot;&gt;Info and tool&lt;/a&gt;</description>
 </item>
  <item>
 <title>RexSpy Slides</title>
 <pubDate>Fri, 16 Mar 2007 13:06:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2007/03/16#rexspy2</link>
 <description>
here are the &lt;a href=&quot;http://www.it-sa.de/fileadmin/itsa_files/Handouts/2006/RO_Mi_16_30_Hafner.pdf&quot;&gt;slides&lt;/a&gt; on RexSpy. They say nothing at all, I just post the link for completeness.</description>
 </item>
  <item>
 <title>The RexSpy Phone Trojan</title>
 <pubDate>Thu, 15 Mar 2007 21:23:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2007/03/15#rexspy</link>
 <description>
since I first heard about &lt;a href=&quot;http://www.securstar.com/press_2006_10_31.php&quot;&gt;RexSpy&lt;/a&gt; in late February (I know it was
announced in October 2006) I wanted to know how real it is and how it works.
&lt;br&gt;
&lt;br&gt;
&lt;ul&gt;
RexSpy is supposed to be the &lt;i&gt;ultimate&lt;/i&gt; mobile phone trojan that allows one to monitor (listen to) all calls of the
&lt;i&gt;infected&lt;/i&gt; device. Also the Wilfrid Hafner (the author) claims that it works on every single mobile phone.
&lt;/ul&gt;
&lt;br&gt;
The German &lt;a href=&quot;http://www.focus.de/digital/handy/sicherheitsluecke_nid_44790.html&quot;&gt;Focus&lt;/a&gt; (a mainstream non technical
magazine) interviewed Hafner and did a trial using a SymbianOS and WinCE based phone. They claim that he could listen to
calls made with both phones. Other websites like &lt;a href=&quot;http://www.techworld.com/mobility/news/index.cfm?newsid=7425&quot;&gt;Techworld.com&lt;/a&gt; quote him saying that this attack also works against a Siemens C45 (which is a very simple phone with out a fancy smart phone OS).
&lt;br&gt;
&lt;br&gt;
I myself connected Hafner to find out if he is willing to release &lt;i&gt;real&lt;/i&gt; technical information to the public about his findings,
but he refused saying that he sold the RexSpy Technology and therefore no longer could publish any material. This is very bad
especially because Hafner's company is selling a protection kit against mobile phone tapping. This makes you wonder if this
is just a marketing thing.
&lt;br&gt;
&lt;br&gt;
Since I'm not a student anymore I don't have too much spare time on my hands so I only did some basic research. The basic
operation of RexSpy as claimed by Hafner is: the trojan is install via a SMS (a Service-SMS to be precise). The trojan
itself creates a kind of back channel by calling home as soon as the infected phone has an incoming or outgoing call, thereby
the attacker can listen to the call. But how does this work? First idea was: a bug/feature in the GSM module or SIM card 
(or SIM Toolkit). A bug is kind of unlikely to be present on all platforms. A &lt;i&gt;monitoring&lt;/i&gt; feature would be documented
by someone, so this is also unlikely.
&lt;br&gt;&lt;br&gt;
I searched a little more and found the recording of Hafner's talk at Systems, in his
talk he kind of gives it away (if you know what you have too look for). He says he only implemented it for Windows Mobile
(WinCE / PocketPC). That is very interesting since he first claims the RexSpy is universal across all platforms. The thing
that keep me thinking is the Service-SMS which others (including myself) call binary-SMS, since I used
binary-SMS for my &lt;a href=&quot;/pocketpc&quot;&gt;MMS attack&lt;/a&gt;. Here you basically tell the device where to download a MMS message. But
as far as I remember there are other binary-SMS messages (or actually WAPPush messages that are send via binary-SMS) that
tell a mobile phone to go and download a WAP/WEB page. The URL could of course also point to a application binary, which
could be downloaded and executed without user interaction.
So maybe Hafner just found a small back door in the WAPPush handler that allows silent application installation, and
writing a phone monitor tool for Windows Mobile and SymbianOS shouldn't be hard at all. For monitoring one could
use the simple feature like a conference call, this way the trojan application would be very simplistic and small.
&lt;br&gt;
&lt;br&gt;
I'm still not 100% sure how it works (especially because he claims that it works with a old Siemens C45) 
but analyzing the Windows Mobile RexSpy Killer provided by &lt;a href=&quot;http://www.securstar.com&quot;&gt;SecurStar&lt;/a&gt; 
should bring me a step further (I haven't done this yet). I'll keep working on this and keep you updated.
&lt;br&gt;
&lt;br&gt;

&lt;br&gt;
I would really love to hear some comments on this.
&lt;br&gt;
&lt;br&gt;

Links:
&lt;br&gt;
&lt;a href=&quot;http://www.zone-h.org/content/view/14370/31/&quot;&gt;Zone-H&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://www.techworld.com/mobility/news/index.cfm?newsid=7425&quot;&gt;Techworld&lt;/a&gt; (Hafner's talk at Systems in German language)&lt;br&gt;
&lt;a href=&quot;http://www.securstar.com&quot;&gt;SecurStar&lt;/a&gt;&lt;br&gt;</description>
 </item>
  <item>
 <title>HID Attack Page</title>
 <pubDate>Sun, 31 Dec 2006 12:43:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2006/12/31#hidattackpage</link>
 <description>
I just uploaded the web page I made for &lt;a href=&quot;/bluetooth/hidattack.php&quot;&gt;HID Attack&lt;/a&gt;. It 
explains how it all works. Enjoy.</description>
 </item>
  <item>
 <title>HID Attack - Attack Bluetooth Keyboards</title>
 <pubDate>Fri, 29 Dec 2006 22:59:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2006/12/29#hidattack</link>
 <description>
Finally I released my HID attack kit I build over a year ago, get it &lt;a href=&quot;/bluetooth/hidattack01.tar.gz&quot;&gt;here&lt;/a&gt;.
Thanks to Thierry for including it in his talk!

&lt;br&gt;&lt;br&gt;
Story on &lt;a href=&quot;http://www.heise.de/newsticker/meldung/83043&quot;&gt;Heise&lt;/a&gt;.</description>
 </item>
  <item>
 <title>The Silver Bullet Security Podcast</title>
 <pubDate>Sun, 17 Dec 2006 12:47:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2006/12/17#silverbullet</link>
 <description>
&lt;a href=&quot;http://www.cigital.com/silverbullet/&quot;&gt;Gary McGraw's Silver Bullet Podcast&lt;/a&gt; is a real nice
podcast on computer security. If you are a security person check it out!</description>
 </item>
  <item>
 <title>New RSG Website</title>
 <pubDate>Sun, 29 Oct 2006 10:35:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2006/10/29#rsg_smartphonesecurity</link>
 <description>
The &lt;a href=&quot;http://www.cs.ucsb.edu/~rsg/&quot;&gt;Reliable Software Group&lt;/a&gt; (RSG) the
lab I used to work for at UCSB finally put up the new website including all 
my &lt;a href=&quot;http://www.cs.ucsb.edu/~rsg/projects/smartphones/index.html&quot;&gt;Smart Phone Security research&lt;/a&gt;.
I also put up my Master's Thesis titled &lt;a href=&quot;http://www.cs.ucsb.edu/~rsg/projects/smartphones/2006_mulliner_MSThesis.pdf&quot;&gt;Security of Smart Phones&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
I also updated my &lt;a href=&quot;/mobilesecurity/&quot;&gt;Mobile Security Research&lt;/a&gt; website.</description>
 </item>
  <item>
 <title>Advanced Attacks Against PocketPC Phones @ 23c3</title>
 <pubDate>Mon, 16 Oct 2006 20:36:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2006/10/16#23c3talk</link>
 <description>
I'm going to do my &lt;i&gt;0wnd by an MMS&lt;/i&gt; talk at &lt;a href=&quot;http://events.ccc.de/congress/2006/Home&quot;&gt;23c3&lt;/a&gt;.
The talk is more or less a redo from defcon-14, but I will try to fix it up a little. This will be my
first talk at a Chaos Communication Congress and I'm already looking forward to it.</description>
 </item>
  <item>
 <title>ACSAC paper: Vulnerability Analysis of MMS User Agents</title>
 <pubDate>Thu, 28 Sep 2006 21:54:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2006/09/28#acsac_mmsvuln</link>
 <description>
my second &lt;i&gt;scientific&lt;/i&gt; paper, this time at &lt;a href=&quot;http://www.acsac.org&quot;&gt;ACSAC&lt;/a&gt;.
The topic is MMS again - actually the paper was done before DEFCON. For more infos see
details for &lt;a href=&quot;http://acsac.org/2006/advance_program.html#TechnicalSession02&quot;&gt;Session 2&lt;/a&gt;.
The paper is the last one in the session.
&lt;br&gt;&lt;br&gt;
PS: I also applied to &lt;a href=&quot;http://events.ccc.de/congress/2006/cfp/&quot;&gt;23c3&lt;/a&gt; with the same topic aka the DEFCON &lt;a href=&quot;/pocketpc/&quot;&gt;talk&lt;/a&gt;.</description>
 </item>
  <item>
 <title>Talk at Defcon 14</title>
 <pubDate>Sat, 17 Jun 2006 08:04:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2006/06/17#defcon14</link>
 <description>
I'll be giving a talk at this years &lt;a href=&quot;http://www.defcon.org&quot;&gt;defcon&lt;/a&gt; (#14).
&lt;a href=&quot;http://www.defcon.org/html/defcon-14/dc-14-speakers.html#Mulliner&quot;&gt;My talk&lt;/a&gt; will be on 
&lt;i&gt;Advanced Attacks Against PocketPC Phones&lt;/i&gt; and I will show some neat new stuff for/against PocketPC
phones.
&lt;br&gt;
&lt;img src=&quot;/images/dc-14-speaker.jpg&quot; alt=&quot;DC14&quot;&gt;
&lt;br&gt;</description>
 </item>
  <item>
 <title>Trying greylisting</title>
 <pubDate>Thu, 25 May 2006 00:33:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2006/05/25#greylisting</link>
 <description>
I've added &lt;a href=&quot;http://projects.puremagic.com/greylisting/&quot;&gt;greylisting&lt;/a&gt; to the list of spam 
countermeasures for &lt;a href=&quot;http://www.betaversion.net&quot;&gt;our&lt;/a&gt; server project. It works surprisingly
well and the amount of spam arriving at my inbox is reduced by a ratio of 20:1. While this is good
there are of course downsides of greylisting such as an artificial delay for delivery of &lt;i&gt;valid&lt;/i&gt;
or &lt;i&gt;good&lt;/i&gt; email. Also auto whitelisting should take care of regular contacts. Anyway I'm
really interested in how many of our users will see the change in amount of spam vs. delivery delay, and
if anyone of them will demand permanent whitelisting :-)</description>
 </item>
  <item>
 <title>Paper @ DIMVA2006</title>
 <pubDate>Wed, 03 May 2006 19:53:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2006/05/03#dimva2006</link>
 <description>
My (with others) first &lt;i&gt;scientific&lt;/i&gt; paper: Using Labeling to Prevent Cross-Service Attacks Against Smart Phones &lt;br&gt;&lt;br&gt;

&lt;a href=&quot;http://ida.first.fraunhofer.de/sites/www.dimva.org/2006/confProgram.html&quot;&gt;&lt;img src=&quot;/images/dimva2006.gif&quot;&gt;&lt;/a&gt;</description>
 </item>
  <item>
 <title>MobileSecurity @ MUlliNER.ORG</title>
 <pubDate>Tue, 07 Mar 2006 19:04:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2006/03/07#mobilesecurity</link>
 <description>
just put up my &lt;a href=&quot;/mobilesecurity/&quot;&gt;mobile security&lt;/a&gt; research page.
It will basically be a annotated link collection, since my stuff will
mostly be &lt;a href=&quot;/pocketpc/&quot;&gt;PocketPC Security&lt;/a&gt; and I have a
separate section for this. Feel free to send me additions and/or corrections.</description>
 </item>
  <item>
 <title>BSS - Bluetooth Stack Smasher (a L2CAP fuzzer)</title>
 <pubDate>Tue, 07 Feb 2006 04:40:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2006/02/07#l2capfuzzer</link>
 <description>
Pierre Betouin wrote this nice little L2CAP fuzzer based on my &lt;a href=&quot;http://www.betaversion.net/btdsd/&quot;&gt;psm_scan&lt;/a&gt; (l2cap port scanner). He also already discovered bugs in several phones with it.&lt;br&gt;&lt;br&gt;
The tool can be found at: &lt;a href=&quot;http://www.secuobs.com/news/05022006-bluetooth10.shtml&quot;&gt;www.secuobs.com&lt;/a&gt;
&lt;br&gt;&lt;br&gt;
nice work!</description>
 </item>
  <item>
 <title>Bluetooth Spam in Berlin</title>
 <pubDate>Thu, 05 Jan 2006 15:13:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2006/01/05#bluetooth_spam</link>
 <description>
mh57 just pointed me to a Spiegel Online article about &lt;a href=&quot;http://www.spiegel.de/netzwelt/technologie/0,1518,393376,00.html&quot;&gt;Bluetooth advertising&lt;/a&gt; or
BlueSpam as I like to call it. Its about a German company which uses Bluetooth
to beef up their billboards in Berlin. Apparently they just push images, videos, text ads and coupons to any Bluetooth device in range. This is annoying
but you can of course just ignore/reject the transmission or turn of
visibility. The actual security/privacy problem is that people maybe
get used to accept connections from certain senders e.g. BlueSpam
(of course you wouldn't name your system BlueSpam). So what keeps me
from standing next to one of the billboards naming my laptop
BlueSpam and instead of sending a coupon I send &lt;a href=&quot;http://en.wikipedia.org/wiki/Hello.jpg&quot;&gt;hello.jpg&lt;/a&gt;. And since some phones still
don't show what the Bluetooth connection is for I just pull their
phonebook etc., the user will just see &lt;i&gt;Allow connection from BlueSpam?&lt;/i&gt;
Sure I want that coupon.
&lt;br&gt;&lt;br&gt;
This is not a good idea!
&lt;br&gt;&lt;br&gt;
Btw. the company doing this stuff is: &lt;a href=&quot;http://www.wall.de&quot;&gt;Wall AG&lt;/a&gt;</description>
 </item>
  <item>
 <title>UCSB iCTF '05</title>
 <pubDate>Mon, 12 Dec 2005 22:23:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2005/12/12#ucsbictf</link>
 <description>
on Friday Dec. 09. another &lt;a href=&quot;http://www.cs.ucsb.edu/~vigna/CTF/&quot;&gt;UCSB iCTF&lt;/a&gt; took
place once again. As always I was just helping out (the main work is done by others Greg,Vika and Marco) writing &lt;i&gt;services&lt;/i&gt;, placing backdoors and doing what ever is needed. Every time the
event gets bigger and bigger, this time there were 22 teams with about 20 players each plus
2-5 admins for each team and about 10+ people at UCSB organizing - this is about 500 people!
&lt;br&gt;&lt;br&gt;
In the last years teams from Italy dominated the CTF, but not this time! The winners are
all German speaking #1 Aachen, #2 Vienna and #3 Darmstadt. The full scoreboard with
all teams is &lt;a href=&quot;http://www.cs.ucsb.edu/~nomed/final_scores_ictf5.html&quot;&gt;here&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
This was really fun, even for just watching the teams fighting each other :-)</description>
 </item>
  <item>
 <title>Crypto USB disk with dm_crypt and FreeOTFE</title>
 <pubDate>Tue, 30 Aug 2005 23:09:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2005/08/30#dmcryptfreeotfe</link>
 <description>
I all ways wanted to go crypto for my data storage but until now I never owned
any big storage device. Now I have an external 250 gig USB disk which I want
to secure.&lt;br&gt;&lt;br&gt;

The thing with crypted disk all ways comes down to where can I read the disk?
Only on my computer, only with one specific OS, etc. For me it's basically
Linux and from time to time Windows. The two solutions I found where 
&lt;a href=&quot;http://www.jetico.com/&quot;&gt;BestCrypt&lt;/a&gt; which is commercial (at least for Windows) and
dm_crypt/FreeOTFE which is free and has much more features.&lt;br&gt;&lt;br&gt;

I ended up using dm_crypt/FreeOTFE.&lt;br&gt;&lt;br&gt;

&lt;a href=&quot;http://www.saout.de/misc/dm-crypt/&quot;&gt;dm_crypt&lt;/a&gt; is the Linux part of the crypto solution and is
in part of Linux Kernel since 2.6.4. With &lt;i&gt;cryptsetup&lt;/i&gt; its super simple
to setup. You can setup a partition or a file based crypto device. The
device then can be formated with whatever filesystem you want. Of course you
need one which is readable by Windows (e.g. vfat/fat32). 
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.freeotfe.org/&quot;&gt;FreeOTFE&lt;/a&gt; is the Windows counterpart of dm_crypt and can mount
whatever you created with dm_crypt. I guess multi-disk volumes don't work but I haven't tryed it. When mounting a filesystem use &lt;i&gt;mount Linux...&lt;/i&gt; otherwise it doesn't work :)
&lt;br&gt;&lt;br&gt;
For the external USB disk I have two partitions, one small partition which is
not encrypted - this holds the Windows drivers (FreeOTFE), the second
partition is the crypto filesystem. With this you can also take your disk
to a friend without downloading drivers and stuff from the net. All in all a
nice solution. </description>
 </item>
  <item>
 <title>MobileBugtraq</title>
 <pubDate>Wed, 13 Apr 2005 23:08:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2005/04/13#mobilebugtraq</link>
 <description>
&lt;a href=&quot;http://www.mobilebugtraq.com&quot;&gt;MobileBugtraq&lt;/a&gt;
is a new bugtracking maillinglist dedicated to mobile device technology. The
list is super new, so not many posts by now. I actually only saw two sofar
and I couldn't find an archieve.&lt;br&gt;&lt;br&gt;
Anyway everybody who is into mobile and security (like myself) should check it
out.</description>
 </item>
  <item>
 <title>Seizure tools</title>
 <pubDate>Mon, 04 Apr 2005 19:17:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2005/04/04#seizuretools</link>
 <description>
&lt;img src=&quot;/images/stronghold_tent.gif&quot; align=left&gt;
while doing some web research on PDA/phone security I found this company &lt;a href=&quot;http://www.paraben-forensics.com/catalog/index.php?cPath=26&quot;&gt;Paraben&lt;/a&gt; which
sells special seizure equipment for PDAs and phones. They really sell a lot of crazy stuff. I especially like the &lt;i&gt;StrongHold Tent&lt;/i&gt; (the image on the left).
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;</description>
 </item>
  <item>
 <title>BluePrinting</title>
 <pubDate>Mon, 27 Dec 2004 18:25:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2004/12/27#blueprinting</link>
 <description>
today (at/for &lt;a href=&quot;http://21c3.ccc.de&quot;&gt;21C3&lt;/a&gt;) &lt;a href=&quot;http://trifinite.org/trifinite_group_martin.html&quot;&gt;Martin&lt;/a&gt; and
I released our Bluetooth fingerprinting tool &lt;a href=&quot;http://trifinite.org/trifinite_stuff_blueprinting.html&quot;&gt;BluePrint&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
It is a really nice and simple Perl script and just reads the output of sdptool (&lt;a href=&quot;http://www.bluez.org&quot;&gt;BlueZ&lt;/a&gt;).
Please also check the &lt;a href=&quot;http://www.betaversion.net/btdsd/&quot;&gt;Bluetooth Device Security Database&lt;/a&gt;.</description>
 </item>
  <item>
 <title>Buffer Overflow</title>
 <pubDate>Sun, 28 Nov 2004 02:05:00 GMT</pubDate>
 <link>http://www.mulliner.org/blog/blosxom.cgi/2004/11/28#bufferoverflow</link>
 <description>
I just started &lt;i&gt;learning&lt;/i&gt; how to write &lt;i&gt;exploits&lt;/i&gt; utilizing &lt;i&gt;buffer overflows&lt;/i&gt;. It is a real fun thing to do and
the best part of all: it is a part of a homework for university :-) Now I know why many people write exploits it is a nice way to
get around a rainy weekend day. </description>
 </item>
  </channel>
</rss>