AI Accelerated Exploiting: Compromising MTE Enabled Pixel from DSP Coprocessor
Using AI to accelerate exploit development against MTE-hardened Pixel devices, attacking via the DSP coprocessor.
Using AI to accelerate exploit development against MTE-hardened Pixel devices, attacking via the DSP coprocessor.
Attacking Samsung devices through the Exynos coprocessor — a deep dive into an underexplored attack surface.
How an undocumented DSP attack surface on the Pixel 8 becomes a path to bypassing Memory Tagging Extension.
GPUAF — two independent exploitation paths to root any Qualcomm-based Android device via the GPU attack surface.
A novel VM escape path in VMware Workstation through the virtual Bluetooth device implementation.
A year's worth of targeted fuzzing against XNU's Mach IPC subsystem — methodology, findings, and lessons learned.
Classic PHP vulnerability classes revisited in modern enterprise security products — because old bugs never really die.
Markdown rendering in Electron apps opens a surprising attack surface — what looks like plain text can become code execution.
KidFuzzerV2.0 — a second-generation fuzzing framework targeting Apple's ecosystem — and the vulnerabilities it surfaced.
macOS Time Machine's backup mechanism as an unexpected attack surface for privilege escalation.
Combining coverage-guided and generational fuzzing to tackle Apple kernel drivers — design, implementation, and results.
Four distinct escape paths from Google Kubernetes Engine pods to the underlying host — a study in how container isolation assumptions break down.