Bits, Please!
Bits Please Blogspot. A security blog focusing on Android, the Linux Kernel and everything nice..
Read Bits-please.blogspot.com news digest here: view the latest Bits Please Blogspot articles and content updates right away or get to their most visited pages. Bits-please.blogspot.com is not yet rated by Alexa and its traffic estimate is unavailable. It seems that Bits Please Blogspot content is notably popular in USA. We haven’t detected security issues or inappropriate content on Bits-please.blogspot.com and thus you can safely use it. Bits-please.blogspot.com is hosted with Google LLC (United States) and its basic language is English.
- Content verdict: Safe
- Website availability: Live
- Language: English
- Last check:
-
N/A
Visitors daily -
N/A
Pageviews daily -
N/A
Google PR -
N/A
Alexa rank
Best pages on Bits-please.blogspot.com
-
A security blog focusing on Android, the Linux Kernel and everything nice.
-
How bad is it? The first vulnerability (CVE-2014-7921) was present in all Android version from 4.0.3 onwards. The second vulnerability (CVE-2014-7920) was present in all Android versions from 2.2 (...
-
Welcome to a new series of blog posts! In this series, we'll dive once more into the world of TrustZone, and explore a new chain of vulnerabilities and corresponding exploits which will allow us to e...
Bits-please.blogspot.com news digest
-
7 years
Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption
After covering a TrustZone kernel vulnerability and exploit in the previous blog post, I thought this time it might be interesting to explore some of the implications of code-execution within the TrustZone kernel. In this blog post, I'll demonstrate...
-
7 years
TrustZone Kernel Privilege Escalation (CVE-2016-2431)
In this blog post we'll continue our journey from zero permissions to code execution in the TrustZone kernel. Having previously elevated our privileges to QSEE, we are left with the task of exploiting the TrustZone kernel itself.
"Why?", I hear you ask.... -
7 years
War of the Worlds - Hijacking the Linux Kernel from QSEE
After seeing a full QSEE vulnerability and exploit in the previous blog post, I thought it might be nice to see some QSEE shellcode in action.
As we've previously discussed, QSEE is extremely privileged - not only can it interact directly with the TrustZone kernel and access the hardware-secured TrustZone file-system (SFS), but it also has some direct form of access to the system's memory.... -
7 years
QSEE privilege escalation vulnerability and exploit (CVE-2015-6639)
In this blog post we'll discover and exploit a vulnerability which will allow us to gain code execution within Qualcomm's Secure Execution Environment (QSEE). I've responsibly disclosed this vulnerability to Google and it has been fixed - for the exact...
Domain history
Web host: | Google LLC |
Registrar: | MarkMonitor Inc. |
Registrant: | Google LLC |
Updated: | June 29, 2023 |
Expires: | July 31, 2024 |
Created: | July 31, 2000 |
Whois record
Safety scores
Trustworthiness
N/AChild safety
N/A