CENSUS participated at the OffensiveCon 2020 conference with a presentation by computer security researcher Aris Thallas on "Emulating Hypervisors: a Samsung RKP case study".
The recent key reinstallation attacks (KRACK) against the WPA2 protocol revealed how an adversary can easily eavesdrop, and in some cases
tamper, a Wi-Fi connection secured by the WPA2 protocol. At the same
time, Wi-Fi automatic association attacks achieve a similar result
(man-in-the-middle position) not by attacking the WPA2 protocol directly
but by enforcing Wi-Fi clients to join a rogue Access Point.
About four months ago (April 2017), Vasilis Tsaousoglou and myself presented our work on exploiting Android's libc allocator at the 2017 INFILTRATE conference (Miami, Florida). Since version 5.0, Android has adopted the jemalloc allocator as its default libc malloc(3) implementation. For our talk we extended our previously released jemalloc heap exploration and exploitation tool called 'shadow' to support Android (both ARM32 and ARM64), and demonstrated its use on understanding the impact of libc heap corruption vulnerabilities. We also presented new jemalloc/Android-specific exploitation techniques for double free and arbitrary free vulnerabilities.
Lure10 is a novel technique presented at the Hack-in-the-Box 2017 conference in Amsterdam that
enables an attacker to automatically achieve a man-in-the-middle
position against wireless devices running the Windows operating system.
The attack requires no user interaction and exploits the "Wi-Fi Sense" feature found in recent versions of the Microsoft Windows platform.