Is your device’s update protocol secure? And even if so, do updates introduce new and significant exploitable vulnerabilities? Is a security certified device still certified after a firmware ...
Exploring the Boundaries of EMFI – FI Needle
Learn whether a real-world mobile phone can be influenced by fault injection attacks without any hardware modifications or attacker control code.
Premium Content Delivery on Android: how to guard an open platform
In this publication, we discuss the state of security of Android applications for premium content delivery.