Cellular baseband security
MetadataShow full item record
Memory corruption vulnerabilities have been exploited by attackers to com- promise systems for years. Traditional computing systems have had years of defenses developed for them such as ASLR and DEP. However, these technologies have not been implemented in embedded systems. Embedded systems have great power in a computing system and control many critical functions. If an attacker can compromise one of these systems, such as a network interface, then it is a serious threat. In a cellular network the network interface is known as the baseband. Cellular protocols are far more complex than traditional network protocols, so a few companies o↵er systems that can be integrated into a phone. The cellular network is becoming the primary communication network for many and disrupting cellular communication can have a devastating impact. I hope to find a memory corruption vulnerability in the baseband of a cellular phone and develop defenses to protect the phone against it.