8/16/2023 0 Comments SetoolsIn fact, I still have to reference the extremely verbose answer provided by StackOverflow user WhiteWinterWolf when answering the question: How can I parse v30 SELinux policies for Android? I realized fairly quickly that the process of analyzing the SEAndroid policy on a given device unexpectedly tricky. In 2017, I started creating tools to process and navigate the SEAndroid details from a given device (part of my dtf project, which hasn't gotten much love lately). For those unfamiliar, this has been a focus of mine since 2016 when I realized how much of an impact SEAndroid was having on the threat landscape of Android devices. ![]() In 2018, I spoke at ANYCON on my continued research on SEAndroid. ![]() ![]() Behind the scenes, however, I've continued to perform embedded device research (not just Android!), and still try to maintain a toolset that works. I haven't been the best about updating my tools or blog in the past 12 months, I know.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |