All Your Baseband Are Belong to Us

Provided by: Topic: Hardware Date Added: Jan 2014 Format: Webcast
In this webcast, the presenter explores the viability of attacks against the baseband processor of GSM cellular phones and shows first practical results that enable code execution on them. It will include a demo of a practical exploitation of a remote memory corruption on the iPhone4.

Find By Topic