Specialties
iOSmacOSKernelFuzzingAndroid
Publications
CODE BLUE 2025 · 2025
AI Accelerated Exploiting: Compromising MTE Enabled Pixel from DSP Coprocessor
Using AI to accelerate exploit development against MTE-hardened Pixel devices, attacking via the DSP coprocessor.
CODE BLUE 2025 · 2025
Dancing with Exynos Coprocessor: Pwning Samsung for Fun and "Profit"
Attacking Samsung devices through the Exynos coprocessor — a deep dive into an underexplored attack surface.
HITCON 2025 · 2025
Cracking the Pixel 8: Exploiting the Undocumented DSP to Bypass MTE
How an undocumented DSP attack surface on the Pixel 8 becomes a path to bypassing Memory Tagging Extension.
POC 2024 · 2024
GPUAF: Two Ways of Rooting All Qualcomm-based Android Phones
GPUAF — two independent exploitation paths to root any Qualcomm-based Android device via the GPU attack surface.
Offensivecon 2023 · 2023
Unearthing Vulnerabilities in the Apple Ecosystem: The Art of KidFuzzerV2.0
KidFuzzerV2.0 — a second-generation fuzzing framework targeting Apple's ecosystem — and the vulnerabilities it surfaced.
POC 2022 · 2022
The Journey To Hybrid Apple Driver Fuzzing
Combining coverage-guided and generational fuzzing to tackle Apple kernel drivers — design, implementation, and results.