The presentation discusses the vulnerabilities and patches made to Samsung's proprietary chips, and the potential for developing custom firmware for embedded devices like phones.
- The vulnerability required root access, but once compromised, the chip could be used for more than just mobile payments.
- Custom firmware development for proprietary chips can be challenging but rewarding, and can expand the functionality of embedded devices.
- Bootloader vulnerabilities are increasingly common and can remain for years.
- Undisclosed vulnerabilities in old chips are likely to be present in new ones.
- An anecdote is given about modifying a Samsung phone's chip to fully implement My Fair Classic, allowing for spoofing of 13.56 MHz access controls.
- Other examples of custom firmware development include adding Wi-Fi monitor mode to Broadcom chipsets and extra debugging functionality to Bluetooth chipsets.
The speaker modified a Samsung phone's chip to fully implement My Fair Classic, allowing for spoofing of 13.56 MHz access controls. This could be used to gain access to a wide range of systems, and was more subtle than using a dedicated attack tool like a Proxmark or antenna. The vulnerability required root access, but once compromised, the chip could be used for more than just mobile payments.