In this talk I will describe how I used an exploit chain to defeat the new Samsung KNOX with zero privilege (exploit chain can be executed by any untrusted application), including KASLR bypassing, DFI bypassing, SELinux fully bypassing and privilege escalation. All details of vulnerabilities and mitigation bypassing techniques will be given during the presentation.
By Di Shen
Full Abstract & Presentation Materials: https://www.blackhat.com/us-17/briefi...
By Di Shen
Full Abstract & Presentation Materials: https://www.blackhat.com/us-17/briefi...
Defeating Samsung KNOX with Zero Privilege cyber security 意味 | |
97 Likes | 97 Dislikes |
7,407 views views | 117K followers |
Travel & Events | Upload TimePublished on 4 May 2018 |
Không có nhận xét nào:
Đăng nhận xét