Tag: reverse-engineering

55 articles
Date Wed 27 March 2019
Author Romain Thomas
Category Android

This blog post is about techniques to disable Android runtime restrictions


NotPetya [0] is a variant of the Petya ransomware [1] that appeared in June 2017 in Ukraine. These malwares have the particularity to rewrite the MBR of computers that are still using an old fashioned BIOS-based booting system. This MBR encrypts the Master File Table (MFT) of the underlying NTFS partition systems.

Date Mon 11 February 2019
Author Nahuel Riva
Category Hardware

Second part of a blog post series about our approach to reverse engineer a Philips TriMedia based IP camera.

Date Tue 22 January 2019
Author Nahuel Riva
Category Hardware

First part of a blog post series about our approach to reverse engineer a Philips TriMedia based IP camera.

Date Thu 25 October 2018
Author Gwaby
Category Reverse-Engineering

This blogpost briefly presents the Windows Notification Facility and provides a write-up for a nice exercise that was given by Bruce Dang during his workshop at Recon Montreal 2018.

Date Fri 14 September 2018
Author Marwan Anastas
Category Reverse-Engineering

In this blog post we compare the post-exploitation process of two jailbreaks for iOS 11.1.2 : LiberiOS and Electra. We start by giving a quick refresher about jailbreaks, and then proceed with the description of their implementation.

Date Thu 02 August 2018
Author Alexandre Adamski
Category Reverse-Engineering

This blog post provides the reader with an overview of the Intel SGX technology, as a follow-up to SGX Internals. In this second part, we quickly explain how an application interacts with its enclave. We also detail what pieces of software are included within the SDK and PSW. Finally, we summarize the known attacks and concerns with this technology, as well as conclude on the subject.

Date Tue 31 July 2018
Author Joffrey Guilbon
Category Reverse-Engineering

An overview of the TrustZone was given in a previous article. This second article more technically addresses the attack surface and hotspots exposed to an attacker, as well as what can be done once code execution is achieved in the different privilege levels available in TrustZone.

Date Thu 05 July 2018
Author Alexandre Adamski
Category Reverse-Engineering

This blog-post provides the reader with an overview of the Intel SGX technology. In this first part, we explore the additions made to Intel platforms to support SGX, focusing on the processor and memory. We then explain the management and life cycle of an enclave. Finally, we detail two features of enclaves: secret sealing and attestation.

Date Thu 21 June 2018
Author Fred Raynal
Category Life at Quarkslab

This year has been very fruitful for Quarkslab with lots of research, new challenges, newcomers, open source success. It is now a tradition to look back at what we have done during a small conference named “Quarks in the Shell” or just "QITS", where we share the year experience with our customers, partners and friends. QITS meeting is one of the output channels for our research work that is also reflected in internal tools, our open-source projects (e.g. Triton, LIEF and QBDI), and our products (IRMA Enterprise and Epona).