Attacking Soft Tokens - Advanced Reverse Engineering on Android

Traditional hardware 2FA tokens are increasingly being replaced by “soft” tokens – software OTP generators packaged into regular smartphone apps that run on iOS or Android. This is more convenient ...

Attacking BYOD Enterprise Solutions

Enterprise Mobile Security (EMS) is a component of BYOD solutions that promises data, device and communications security for enterprises. Amongst others, it aims to solve Data Loss (via DLP), Netwo...

Exploiting Buffer Overflows on MIPS Architectures

In this paper Lyon Yang walks the reader through the process of writing a code execution exploit for a MIPS device. Tricks described in the paper include dealing with cache incoherencies on MIPS an...