
Christian Lindenmeier
@_chli_
ID: 1583015033247866881
20-10-2022 08:39:41
14 Tweet
29 Followers
76 Following

Coming up at USENIX Security, we have three exciting papers on Android security across all layers of the stack. Learn about fuzzing trusted components, type confusion in trusted APIs and a study on how trusted apps are updated. EPFL EPFL Computer and Communication Sciences actu.epfl.ch/news/finding-s…


As it turns out, the secure monitor, Android's most trusted component is full of bugs. Christian Lindenmeier and Marcel discovered lots of serious issues USENIX Security though fuzzing. Paper: nebelwelt.net/files/24SEC2.p…



🔒 ARM TrustZone is the backbone of mobile devices 📱, and EL3XIR provides an effective framework for rehosting and fuzzing the secure monitor firmware of proprietary TrustZone-based TEEs Join Marcel & Christian Lindenmeier at #hw_ioNL2024 👉 hardwear.io/netherlands-20… #fuzzing #mobilesecurity


🥁🥁🥁...Uncovering Security Vulnerabilities at #hw_ioNL2024! Marcel; Christian Lindenmeier reported 34 bugs in secure monitors, with 17 classified as security critical. Affected vendors confirmed 14, leading to 6 CVEs for EL3XIR 👉 hardwear.io/netherlands-20… #fuzzing #EL#XIR #monitorsecurity



🚨 At #hw_ioNL2024, Marcel Busch and Christian Lindenmeier introduced EL3XIR, a powerful framework designed to rehost and fuzz the secure monitor firmware layer of TrustZone-based TEEs. YouTube Link: youtu.be/x-VRC0WX5Bo?si… #fuzzing #securemonitor #EL3XIR






We sent one of us to scout the grounds of this year's Insomni'hack. From Android rollback attacks to AI-driven malware, here’s what stood out to us: eshard.com/posts/a-look-b…
