Internships 2015

Fri 24 October 2014 by cedric

This year, we have 4 open positions for internships:

  • Analysis of a virtualization platform
  • Binary instrumentation
  • Bootkit UEFI
  • Indicator Of Compromise (IOC) recovery tool

Internship 1: Analysis of a virtualization platform


The purpose of this internship is to study a virtualization system currently used in the cloud. The effective ...

read more

Exploiting a vulnerability in HTC One bootloader and bruteforcing the PIN/password

Wed 23 July 2014 by cedric


This article deals with the presence of the "read_mmc" command in the HTC One phone. Our target phone had Android 4.2.2 and HBOOT 1.54.0000. This vulnerability has been reported to HTC in February 2014 and has been fixed with the Kit Kat (4.4 ...

read more

A quick security review of the Uhuru Mobile demo ROM

Wed 19 March 2014 by kalenz


From February 23 to February 28, we had the opportunity to look at the demo ROMof Uhuru Mobile. Uhuru Mobile is supposed to be a secure Mobile DevicesManagement solution, including its own store, an application validation processall that on top of a hardened Android with protection against unknown code ...

read more

Internships 2014

Fri 15 November 2013 by cedric

We have 4 open positions for internships:

  • Assessment of tools detecting APT
  • Binary instrumentation
  • Analysis of a virtualization platform
  • Electronic Control Units (ECU) analysis

Internship 1: Assessment of tools detecting APT


The first part of the internship consists of analyzing different solutions that detect advanced attacks. Then, based on ...

read more

Presence at 2013

Wed 02 October 2013 by cedric

As some people may have already noticed, we will be present at 2013!

There has been extensive research and attacks on iPhone bootloaders but the Android world is quite large with multiple hardware manufacturers, and therefore has not been fully explored yet. To fill the void, we have ...

read more

And the winner is... KECCAK !

Wed 24 October 2012 by chrys

On November 2006, NIST (National Institute of Standards and Technology) announced a public competition for developing a new cryptographic hash algorithm which would become SHA-3. The submission dead-line was October 2008. NIST received 64 submissions and announced 51 valid candidates for the first round in December 2008 and 14 (including ...

read more

Internships 2013

Thu 18 October 2012 by chrys

We have 3 open positions for internships:

  • Mobile phone bootloader analysis: this internship aims to evaluate the security of existing bootloaders used in smartphones by developing a bootloader debugger and a USB fuzzer.
  • Bootkit Windows 7: this internship aims to study existing bootkits on Windows 7 but also to develop ...
read more

Presence at 2012

Thu 18 October 2012 by Sebastien DUDEK

Just a quick post to let you know that, as some people may already have noticed, we will be present at 2012!

In this talk, we will talk about GSM Protocol Stack and techniques we usually use to find vulnerabilities on new smartphones. You will also see the ...

read more


Mon 02 July 2012 by jj

For the third year we had the chance to participate to REcon 2012.

Here is a summary of the most intelligible talks.

The case for semantics-based methods in reverse engineering

Rolf Rolles started the conference on his predilection subject, semantic analysis of code.

A lengthy introduction reminded us that semantic ...

read more

Low-level iOS forensics

Thu 28 June 2012 by jean

iOS filesystem encryption and data protection mechanisms are now well documented and supported by many forensics tools. iOS devices use NAND flash memory as their main storage area, but physical imaging usually refers to a "dd image" of the logical partitions. The iOS Flash Translation Layer for current devices is ...

read more