nsr is interested in all sorts of low-level firmware, tinkering, and capture the flag competitions. He developed and maintains avatar2, a framework for analyzing embedded systems firmware. Among others, he used the framework within the FirmWire project for emulating Samsung’s Shannon and MediaTek’s MTK baseband firmware, yielding to the discovery of several critical vulnerabilities.

In his day job, nsr is a assistant professor at the University of Birmingham and his research interests cover the (in-)security of embedded systems, as well as binary and microarchitectural exploitation.


Sessions

08-17
10:30
45min
📶 Analyzing Cellular Basebands with FirmWire 🔎
domenukk, nsr

Last year, we released FirmWire to the public, an open-source baseband analysis platform.
But what even is a baseband and why do we want to analyze it? Hint: It’s a critical part of your phone and a first point of entry for attacks.

This talk will answer your questions and provide a hands-on introduction to our framework.

Milliways
Milliways