Conversation

I added some very primitive kernel event logging to running on my phone and dumped it to an azure data store and piped to sentinel. For the first time I feel like I might actually have a chance to know if someone owned my phone.
3
98
Since I assume most phone attacks will involve memory corruption you can grab a lot of loggin data around allocation patterns from kasan, scudo, or hardened allocator. Whether that’s going to be useful for a given exploit is anyone’s guess but you can have it!
6
22
Android used to require kernel patches adding support for controlling network access via socket access groups. It was similar to the grsecurity feature for this. It switched to BPF as part of avoiding Android having any hard dependencies on kernel patches to be fully functional.
1
1