Internships 2013

Thu 18 October 2012 by chrys

We have 3 open positions for internships:

  • Mobile phone bootloader analysis: this internship aims to evaluate the security of existing bootloaders used in smartphones by developing a bootloader debugger and a USB fuzzer.
  • Bootkit Windows 7: this internship aims to study existing bootkits on Windows 7 but also to develop ...
read more

Presence at hack.lu 2012

Thu 18 October 2012 by Sebastien DUDEK

Just a quick post to let you know that, as some people may already have noticed, we will be present at hack.lu 2012!

In this talk, we will talk about GSM Protocol Stack and techniques we usually use to find vulnerabilities on new smartphones. You will also see the ...

read more

Recon2012

Mon 02 July 2012 by jj

For the third year we had the chance to participate to REcon 2012.

Here is a summary of the most intelligible talks.

The case for semantics-based methods in reverse engineering

Rolf Rolles started the conference on his predilection subject, semantic analysis of code.

A lengthy introduction reminded us that semantic ...

read more

Low-level iOS forensics

Thu 28 June 2012 by jean

iOS filesystem encryption and data protection mechanisms are now well documented and supported by many forensics tools. iOS devices use NAND flash memory as their main storage area, but physical imaging usually refers to a "dd image" of the logical partitions. The iOS Flash Translation Layer for current devices is ...

read more

Forensics on Android phones and security measures

Fri 22 June 2012 by cedric

iPhone forensics has been well studied by lots of security people (and our team). Android is less looked at probably because there is less challenge for hackers (because of openness) and also because of the heterogeneity of devices. On mobile devices, forensics is possible as soon as you get code ...

read more

Bypassing ASLR and DEP on Adobe Reader X

Fri 22 June 2012 by guillaume

Due to their complexity and their large deployment on users' machines, Adobe products (especially Flash and Reader) have often received a lot of attention from attackers. Being aware of this fact, Adobe has taken one step forward in security with the latest version of their PDF reader, Adobe Reader X ...

read more

Some feedback from the HITB 2012 conference

Wed 20 June 2012 by cedric

Recently, HITB 2012 took place in Amsterdam (Okura Hotel) and some of us attended.

Impressed by the quality of the conference, we will try to summarize here all presentations that we attended.Also, Sogeti NL organized three challenges (Web application, WiFi and Social Engineering).

Windows RunTime

Sébastien RENAUD and Kévin ...

read more

HTC unlock internals

Tue 10 April 2012 by cedric

Since the end of 2011, HTC allows unlocking its Smartphones' bootloaders. Before that, HTC controlled every updates and packages that were installed on their devices. Users can now unlock their device manually in order to install any installation image (commonly called "ROM" in Android jargon) on their Smartphone. This article ...

read more

Some feedback from the 28C3 conference

Fri 13 January 2012 by cedric

Here is a summary of the talks I attended during CCC. The talks were given in 3 simultaneous tracks, so some choices had to be made. All in all, this is one of the best conferences I attended and I can only recommend it. The slides will be made available ...

read more

Retours sur le 28C3

Mon 09 January 2012 by cedric

Voilà un résumé des conférences auxquelles j'ai assisté. Les planches seront rendues disponibles au fur et à mesure. Les conférences sont réparties sur 3 salles en simultané, il a donc fallu faire des choix. Globalement, c'est une des meilleures conférences auxquelles j'ai pu assister, je ne peux ...

read more