Defeating Samsung KNOX with Zero Privilege
In this talk I will describe how I used an exploit chain to defeat the new Samsung KNOX with zero privilege (exploit chain can be executed by any untrusted application), including KASLR bypassing, DFI bypassing, SELinux fully bypassing and privilege escalation. All details of vulnerabilities and mitigation bypassing techniques will be given during the presentation.
By Di Shen
Full Abstract & Presentation Materials: https://www.blackhat.com/us-17/briefi...
Defeating Samsung KNOX with Zero Privilege
Reviewed by Anonymous
on
May 04, 2018
Rating: