This talk is the tall tale of a frustrated student who wanted to do something cool for his master thesis.
Now don’t get scared if you’re not familiar with half of the terms in the previous paragraph! In this talk we start from the the basics to build into the more complex exploitation techniques.
We start by giving some contextual meaning to this research (aka, the chronicles of GLitch). Then we continue with a “Rowhammer 101” class followed by a deep hardware reverse engineering class to explain the GPU internals that allow us to perform such attack.
And finally we introduce you to the real guest of this talk: GLitch. Here we describe how can we exploit the Firefox browser to gain control over an Android smartphone in under 2 mins. In this part we describe advanced exploitation techniques that can be used to attack the Firefox browser. And, of course, we’re going to give a demo.