├── .gitattributes ├── Advanced Bootkit Techniques on Android.pdf ├── Android平台Bootkit高级攻击技术-4.pdf ├── DiShen_CB19_cros_kernel.pdf ├── Exploit_Explode_BeijingGDG.pdf ├── Keenlab-mosec2016.pdf ├── README.md ├── TZ-exp-on-Android-MOSEC-chn.pdf ├── The-Art-of-Exploiting-Unconventional-Use-after-free-Bugs-in-Android-Kernel.pdf ├── eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation-wp.pdf ├── eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation.pdf ├── us-15-Shen-Attack-Your-Trusted-Core.pdf ├── us-17-Shen-Defeating-Samsung-KNOX-With-Zero-Privilege-wp.pdf ├── us-17-Shen-Defeating-Samsung-KNOX-With-Zero-Privilege.pdf └── xKungfooSH@retme.pdf /.gitattributes: -------------------------------------------------------------------------------- 1 | # Auto detect text files and perform LF normalization 2 | * text=auto 3 | 4 | # Custom for Visual Studio 5 | *.cs diff=csharp 6 | *.sln merge=union 7 | *.csproj merge=union 8 | *.vbproj merge=union 9 | *.fsproj merge=union 10 | *.dbproj merge=union 11 | 12 | # Standard to msysgit 13 | *.doc diff=astextplain 14 | *.DOC diff=astextplain 15 | *.docx diff=astextplain 16 | *.DOCX diff=astextplain 17 | *.dot diff=astextplain 18 | *.DOT diff=astextplain 19 | *.pdf diff=astextplain 20 | *.PDF diff=astextplain 21 | *.rtf diff=astextplain 22 | *.RTF diff=astextplain 23 | -------------------------------------------------------------------------------- /Advanced Bootkit Techniques on Android.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/retme7/My-Slides/c74f11c3d4c1e49595c97db5697ab51ac82139b4/Advanced Bootkit Techniques on Android.pdf -------------------------------------------------------------------------------- /Android平台Bootkit高级攻击技术-4.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/retme7/My-Slides/c74f11c3d4c1e49595c97db5697ab51ac82139b4/Android平台Bootkit高级攻击技术-4.pdf -------------------------------------------------------------------------------- /DiShen_CB19_cros_kernel.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/retme7/My-Slides/c74f11c3d4c1e49595c97db5697ab51ac82139b4/DiShen_CB19_cros_kernel.pdf -------------------------------------------------------------------------------- /Exploit_Explode_BeijingGDG.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/retme7/My-Slides/c74f11c3d4c1e49595c97db5697ab51ac82139b4/Exploit_Explode_BeijingGDG.pdf -------------------------------------------------------------------------------- /Keenlab-mosec2016.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/retme7/My-Slides/c74f11c3d4c1e49595c97db5697ab51ac82139b4/Keenlab-mosec2016.pdf -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | My slides! 2 | 3 | # Timeline 4 | * 2014.7 "Advanced Bootkit Techniques on Android",Syscan360 5 | * 2014.8 "Exploit?Explode!" ,BeijingGDG 6 | * 2015.4 "Executing Kenel exploits via Android system processes",xKungfoo ShangHai 7 | * 2015.6 "Exploiting TrustZone on Android"(Chinese version),MOSEC 8 | * 2015.8 "Attack your trusted core",Black Hat USA 15' (not presented because visa is not issued in time) 9 | * 2016.5 "2015 Recap - Android Root",2016 Qualcomm Mobile Security Summit (not uploaded yet) 10 | * 2016.7 "Talk is cheap, show me the code - How we rooted 10 million phones with one exploit again",MOSEC 2016 11 | * 2016.11 "Rooting every Android: From Extension To Exploitation",Black Hat Europe 16' 12 | * 2017.7 "Defeating Samsung KNOX With Zero Privilege",Black Hat USA 17' 13 | * 2017.11 "The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel", Pacsec & Code Blue 2017 14 | * 2019.10 "Attacking DRM subsystem to gain kernel privilege on Chromebooks", Code Blue 2019 -------------------------------------------------------------------------------- /TZ-exp-on-Android-MOSEC-chn.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/retme7/My-Slides/c74f11c3d4c1e49595c97db5697ab51ac82139b4/TZ-exp-on-Android-MOSEC-chn.pdf -------------------------------------------------------------------------------- /The-Art-of-Exploiting-Unconventional-Use-after-free-Bugs-in-Android-Kernel.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/retme7/My-Slides/c74f11c3d4c1e49595c97db5697ab51ac82139b4/The-Art-of-Exploiting-Unconventional-Use-after-free-Bugs-in-Android-Kernel.pdf -------------------------------------------------------------------------------- /eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation-wp.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/retme7/My-Slides/c74f11c3d4c1e49595c97db5697ab51ac82139b4/eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation-wp.pdf -------------------------------------------------------------------------------- /eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/retme7/My-Slides/c74f11c3d4c1e49595c97db5697ab51ac82139b4/eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation.pdf -------------------------------------------------------------------------------- /us-15-Shen-Attack-Your-Trusted-Core.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/retme7/My-Slides/c74f11c3d4c1e49595c97db5697ab51ac82139b4/us-15-Shen-Attack-Your-Trusted-Core.pdf -------------------------------------------------------------------------------- /us-17-Shen-Defeating-Samsung-KNOX-With-Zero-Privilege-wp.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/retme7/My-Slides/c74f11c3d4c1e49595c97db5697ab51ac82139b4/us-17-Shen-Defeating-Samsung-KNOX-With-Zero-Privilege-wp.pdf -------------------------------------------------------------------------------- /us-17-Shen-Defeating-Samsung-KNOX-With-Zero-Privilege.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/retme7/My-Slides/c74f11c3d4c1e49595c97db5697ab51ac82139b4/us-17-Shen-Defeating-Samsung-KNOX-With-Zero-Privilege.pdf -------------------------------------------------------------------------------- /xKungfooSH@retme.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/retme7/My-Slides/c74f11c3d4c1e49595c97db5697ab51ac82139b4/xKungfooSH@retme.pdf --------------------------------------------------------------------------------