Rubiks Cube!

Sagi Kedmi

Blackhat Europe: Attacking /dev/urandom on Android

20.10.2014, in { android, kernel, vuln }

Our paper was accepted to both Usenix WOOT and Blackhat Europe! So Nadja and I got to go to Amsterdam :) !

Dead Canary

We wanted to exploit CVE-2014-3100 - a stack based buffer overflow in Android’s Keystore. We needed to bypass the stack canary. Long story short, we devised probablistic attacks that enables an attacker to predict random bytes that are extracted from the underlying entropy pool of /dev/urandom during device boot, such as Keystore’s canary value.

[slides] [paper]

Here is a picture of Adi Shamir and I. We’ve met in the speaker’s lounge. He also attended my talk!

Adi Shamir and I

Never have I spoken to so many people, let alone in a foriegn language. It was a daunting, yet necessary, baptism of fire.

Edit: Blackhat uploaded the videos, here is the talk: