March 18, 2024, 5:52 p.m. | Black Hat

Black Hat www.youtube.com

...First, we will show the historical research background of the NPU security and attack surface. Next, we'll talk about the vulnerabilities that we found in different NPU systems, from Samsung Exynos, Qualcomm and Apple Silicon chipsets. We will then demonstrate the code auditing/firmware reversing methodology and bug patterns and we will discuss the code execution exploitation on Exynos NPU ARM core and Android root exploitation with a Qualcomm NPU kernel driver bug...

By: Shupeng Gao , Zheng Huang , Le …

apple apple silicon attack attack surface auditing bug code code execution discuss exynos firmware found methodology next patterns platforms qualcomm research reversing samsung samsung exynos security silicon systems vulnerabilities

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Application Security Engineer - Enterprise Engineering

@ Meta | Bellevue, WA | Seattle, WA | New York City | Fremont, CA

Security Engineer

@ Retool | San Francisco, CA

Senior Product Security Analyst

@ Boeing | USA - Seattle, WA

Junior Governance, Risk and Compliance (GRC) and Operations Support Analyst

@ McKenzie Intelligence Services | United Kingdom - Remote

GRC Integrity Program Manager

@ Meta | Bellevue, WA | Menlo Park, CA | Washington, DC | New York City