Lukas Seidel's research while affiliated with Technische Universität Berlin and other places

Publications (3)

Preprint
Full-text available
Rogue base stations are an effective attack vector. Cellular basebands represent a critical part of the smartphone's security: they parse large amounts of data even before authentication. They can, therefore, grant an attacker a very stealthy way to gather information about calls placed and even to escalate to the main operating system, over-the-ai...

Citations

... The most important thing in an environment where firmware binary is fuzzing is that it is a closed-source code and is significantly influenced by hardware. There are several studies, including studies dealing with UEFI Firmware [11], Firmware Baseband [34]- [36], and IoT [12], [20]- [22]. ...
... Library Fuzzing. Fuzzing [6,7,15,16,33,53] is a popular technique for evaluating the security of software and hardware components [14,36] and finding critical vulnerabilities. Different approaches are needed to fuzz complex targets that require wellstructured data types [5,22,25,27,60]. ...