Note: Regarding COVID-19 safety, Hardwear.io will seek to ensure a safe event, as the health and safety of our exhibitors, delegates, speakers, and staff will always be our number one priority. Hardwear.io will follow all applicable health regulations required by the local (GGD) and government (RIVM and VWA) authorities.
The training teaches the structure of typical cellular baseband firmware on the example of Samsung’s Shannon baseband. We cover how basebands communicate internally, how to reverse engineer them, and how to find security vulnerabilities through emulation and fuzzing.
The training uses firmware binaries from real phones. While most of the training is centered around static and dynamic off-device testing, such as reverse engineering and emulation, participants also get the chance to interact with the phones over the air.
Participants will gain hands-on experience on baseband firmware in modern smartphones. They will learn the general structure of a baseband RTOS, by the example of the Shannon baseband. Together, we will dump the firmware from the device, take a deep dive into the binary, find common patterns and reverse engineer protocol parsers.
Equipped with the gained knowledge about the firmware, students will learn how to rehost selected parsers and fuzz-test them using AFL++. Lastly, we will set up a fake base station using commercially available Software Defined Radios.
Dominik Maier is one of the maintainers of AFL++, a renowned fork of the fuzzer AFL. He works as Program Manager Security and pursues his PhD at TU Berlin. His BaseSAFE framework to fuzz basebands received a nomination for most innovative research at the 2020 Pwnie Awards. He previously conducted research at FAU Erlangen-Nuremberg (Germany), NECST-lab of Politecnico di Milano (Italy) and at SecLab UC Santa Barbara, CA (USA). He works on security development projects, consulting and pentesting. In his spare-time he likes to travel and participate in CTFs with ENOFLAG.
Marius Muench is a postdoctoral researcher at Vrije Universiteit Amsterdam. His research interests cover (in-)security of embedded systems, binary & microarchitectural exploitation, and defenses. He obtained his PhD from Sorbonne University in cooperation with EURECOM. He developed and maintains avatar2, a framework for analyzing embedded systems firmware. Among others, he used the framework for emulating baseband firmware, and helped to uncover critical vulnerabilities in Samsung’s Shannon baseband.