All Your Baseband Are Belong to Us

In this webcast, the presenter explores the viability of attacks against the baseband processor of GSM cellular phones and shows first practical results that enable code execution on them. It will include a demo of a practical exploitation of a remote memory corruption on the iPhone4.
Provided by: Topic: Hardware Date Added: Jan 2014 Format: Webcast

Find By Topic