Daniel Klischies
dklischies.bsky.social
Daniel Klischies
@dklischies.bsky.social
Firmware/OS/Cellular Security Research @ruhr-uni-bochum.de
Reposted by Daniel Klischies
At USENIX Security? Then check out:

Studying the Use of CVEs in Academia, won distinguished paper award www.usenix.org/conference/u...

Discovering and Exploiting Vulnerable Tunnelling Hosts, won most innovative research Pwnie @ DEFCON www.usenix.org/conference/u...

Big thanks to all co-authors!!
August 13, 2025 at 10:30 PM
Our OffensiveCon talk on stateful baseband emulation (and how improper string handling led to baseband RCE) is available on YouTube: youtu.be/zoAITq7jUM8. It has been a pleasure; awesome conference, brilliant people. Slides and paper: www.danielklischies.net/research/bas...
OffensiveCon25 - Daniel Klischies and David Hirsch
YouTube video by OffensiveCon
youtu.be
May 28, 2025 at 11:21 AM
Congrats to the entire team (cc @noopwafel.bsky.social, @nsinusr.bsky.social, @veelasha.bsky.social). We will have the paper available on Monday (on IEEE CSDL and open access). The code will become available once we've had time to clean it up + add docs. 6/6
May 11, 2025 at 10:23 AM
That lead to the discovery of 8 vulnerabilities (3 dupes) in Samsung and MediaTek BBs. Among the vulnerabilities are at least 2 RCEs exploitable OTA. One of them is preauth (CVE-2024-20154), affecting 51 MediaTek chipset and thousands of phone models. Drop by our presentations to learn more! 5/6
May 11, 2025 at 10:23 AM
From a security perspective, this unlocks a lot of additional attack surface within the emulator, previously only reachable OTA (where fuzzing is unfeasibly slow and you can't introspect). By integrating BaseBridge into FirmWire we improved coverage in AFL++ by a factor of 4. 4/6
May 11, 2025 at 10:23 AM
Demo time. Left: BaseBridge integrated into the FirmWire baseband emulator, emulating a MediaTek BB, into which we inject a packet requesting UE capabilities. Right side: WireShark tapping into the emulator, showing the request and the uplink response (2nd pkt) generated in the emulator. 3/6
May 11, 2025 at 10:23 AM
We developed a way to transfer memory dumps from commercial smartphone basebands into an emulator. This provides the emulated baseband with state needed to process many different downlink network packets, to the point where it even generates the correct uplink response. 2/6
May 11, 2025 at 10:23 AM
📢 Excited to announce that the results on BaseBridge, our project on improving cellular baseband emulation, are going public this week. Dyon will present at IEEE S&P on Monday 3pm, while David and I will be on stage at @offensivecon.bsky.social on Saturday 11am with even more details! 1/6
May 11, 2025 at 10:23 AM
I gave an introductory talk on baseband security, focusing on root-causes of vulnerabilities, at this year's wonderful RuhrSec conference. The recording is now now available: www.youtube.com/watch?v=APBy...
RuhrSec 2025 | Behind Closed Curtains - Insights on Security Vulnerabilities in Smartphone Basebands
YouTube video by Hackmanit – IT Security
www.youtube.com
March 22, 2025 at 1:11 PM
Reposted by Daniel Klischies
Reviewer 2 just rejected your latest offensive security paper? Or didn't submit it anywhere yet? There's still more than a day left to (re)submit to USENIX WOOT '25 and get reviews from a community who will appreciate all those clever hacks, weird bugs 👾 and fun exploits! woot25.usenix.hotcrp.com
WOOT '25
woot25.usenix.hotcrp.com
March 10, 2025 at 9:39 PM
Reposted by Daniel Klischies
Drahtlose Systeme wie Autotüren sind attraktive Ziele für Hacker. Ein Team des Exzellenzclusters CASA hat einen Weg gefunden, sie optimiert anzugreifen. Und schlägt Gegenmaßnahmen vor: news.rub.de/wissenschaft...
February 25, 2025 at 9:19 AM