All Your Baseband Are Belong to Us

Watch Now
Provided by:
Topic: Hardware
Format: Webcast
In this webcast, the presenter explores the viability of attacks against the baseband processor of GSM cellular phones and shows first practical results that enable code execution on them. It will include a demo of a practical exploitation of a remote memory corruption on the iPhone4.
Watch Now

Find By Topic