Daniel Klischies
@dklischies.bsky.social
📤 39
📥 78
📝 8
Firmware/OS/Cellular Security Research
@ruhr-uni-bochum.de
reposted by
Daniel Klischies
Mathy Vanhoef
about 1 month ago
At USENIX Security? Then check out: Studying the Use of CVEs in Academia, won distinguished paper award
www.usenix.org/conference/u...
Discovering and Exploiting Vulnerable Tunnelling Hosts, won most innovative research Pwnie @ DEFCON
www.usenix.org/conference/u...
Big thanks to all co-authors!!
0
14
7
Our OffensiveCon talk on stateful baseband emulation (and how improper string handling led to baseband RCE) is available on YouTube:
youtu.be/zoAITq7jUM8
. It has been a pleasure; awesome conference, brilliant people. Slides and paper:
www.danielklischies.net/research/bas...
loading . . .
OffensiveCon25 - Daniel Klischies and David Hirsch
YouTube video by OffensiveCon
https://youtu.be/zoAITq7jUM8
4 months ago
0
9
3
📢 Excited to announce that the results on BaseBridge, our project on improving cellular baseband emulation, are going public this week. Dyon will present at IEEE S&P on Monday 3pm, while David and I will be on stage at
@offensivecon.bsky.social
on Saturday 11am with even more details! 1/6
5 months ago
1
13
8
I gave an introductory talk on baseband security, focusing on root-causes of vulnerabilities, at this year's wonderful RuhrSec conference. The recording is now now available:
www.youtube.com/watch?v=APBy...
loading . . .
RuhrSec 2025 | Behind Closed Curtains - Insights on Security Vulnerabilities in Smartphone Basebands
YouTube video by Hackmanit – IT Security
https://www.youtube.com/watch?v=APByR2VPnzU
6 months ago
0
1
0
reposted by
Daniel Klischies
7 months ago
Reviewer 2 just rejected your latest offensive security paper? Or didn't submit it anywhere yet? There's still more than a day left to (re)submit to USENIX WOOT '25 and get reviews from a community who will appreciate all those clever hacks, weird bugs 👾 and fun exploits!
woot25.usenix.hotcrp.com
loading . . .
WOOT '25
https://woot25.usenix.hotcrp.com
0
8
8
reposted by
Daniel Klischies
Ruhr-Universität Bochum
7 months ago
Drahtlose Systeme wie Autotüren sind attraktive Ziele für Hacker. Ein Team des Exzellenzclusters CASA hat einen Weg gefunden, sie optimiert anzugreifen. Und schlägt Gegenmaßnahmen vor:
news.rub.de/wissenschaft...
0
11
3
you reached the end!!
feeds!
log in