Loading...

Security Research & Publications

To be defensive, you must know the offensive.
Home / Research 



Exploiting Google Chrome's V8 JIT Engine (CVE-2020-16040)

Chrome's V8 JIT compiler's Simplified Lowering VisitSpeculativeIntegerAdditiveOp was setting Signed32 as restriction type, even when relying on a Word32 truncation, skipping an overflow check. To summarise, the problem was due to a mis-typing of nodes despite the value wrapping/overflowing. Which allowed for a typer hardening bypass to achieve out-of-bounds r/w primitives, leading to arbitrary remote code execution within the renderer's process.

Elliptic Curve Diffie-Hellman Theoretical Analysis

Elliptic curve Diffie-Hellman (ECDH) is an anonymous key agreement protocol, an extension of the conventional Diffie-Hellman protocol, but incorporates elliptic curves as opposed to integers over Galois fields. This theoretical analysis elucidates the employed mathematical mechanisms, specifically exploring group operations and the intricate mechanics of the curve.


Conventional Diffie-Hellman Theoretical Analysis

The conventional Diffie-Hellman key exchange is a popular means of generating a shared secret between two individuals through integers over finite fields without it being known to external observers. This theoretical analysis aims to elucidate the employed mathematical mechanisms, focusing on the discrete logarithm problem and modular arithmetic.

Android Malware Analysis

An analysis of Android malware with APT36 origins, a Pakistani government-aligned actor that is a politically motivated Advanced Persistent Threat (APT) group. This APT group has been linked to Pakistan and mainly focuses its resources on targeting Indian Government entities and personnel. The motivation behind these attacks is information theft and espionage to gather intelligence from the Indian government, military, and diplomatic resources.