The Futex Vulnerability

Here at Appdome, we take mobile security seriously. Naturally, the news of a new rooting mechanism aroused our curiosity and concern. […]

By |2018-09-25T16:26:12+00:00September 11th, 2014|

Owning the Kernel & Root

This time we’ll discuss how to use the basic building block of the limited form of kernel-write we found last time in order to get unrestricted write to the kernel, and ultimately root privileges. […]

By |2018-09-24T05:00:07+00:00October 6th, 2014|

Need a new search?

If you didn't find what you were looking for, try a new search!

Scroll Up