Daniel Klischies Profile
Daniel Klischies

@danielklischies

Followers
112
Following
16
Media
3
Statuses
17

PhD student @ruhrunibochum | Systems Security | Firmware & Operating Systems

Joined February 2021
Don't wanna be here? Send us removal request.
@danielklischies
Daniel Klischies
5 months
Our OffensiveCon talk on stateful baseband emulation (and how improper string handling led to baseband RCE) is available on YouTube: https://t.co/n8KqwHZ966. It has been a pleasure; awesome conference, brilliant people. Slides and paper:
0
12
46
@danielklischies
Daniel Klischies
6 months
Congrats to the entire team (cc @noopwafel, @nSinusR, @veelasha_m). We will have the paper available on Monday (on IEEE CSDL and open access). The code will become available once a few other disclosure processes have concluded and we've had time to clean it up + add docs. 6/6
0
0
3
@danielklischies
Daniel Klischies
6 months
That lead to the discovery of 8 vulnerabilities (3 dupes). Among the vulnerabilities are at least 2 RCEs exploitable OTA. One of them is preauth (CVE-2024-20154), affecting 51 MediaTek chipset and thousands of phone models. Drop by our presentations to learn more! 5/6
1
0
0
@danielklischies
Daniel Klischies
6 months
From a security perspective, this unlocks a lot of additional attack surface within the emulator, previously only reachable OTA (where fuzzing is unfeasibly slow and you can't introspect). By integrating BaseBridge into FirmWire we improved coverage in AFL++ by a factor of 4. 4/6
1
0
0
@danielklischies
Daniel Klischies
6 months
Demo time. Left: BaseBridge with FirmWire baseband emulator, emulating a MediaTek BB, into which we inject a packet requesting UE capabilities. Right side: WireShark tapping into the emulator, showing the request and the uplink response (2nd pkt) generated in the emulator. 3/6
1
0
1
@danielklischies
Daniel Klischies
6 months
We developed a way to transfer memory dumps from commercial smartphone basebands into an emulator. This provides the emulated baseband with state needed to process many different downlink network packets, to the point where it even generates the correct uplink response. 2/6
1
0
0
@danielklischies
Daniel Klischies
6 months
📢 Excited to announce that the results on BaseBridge, our project on improving cellular baseband emulation, are going public this week. @dyonwg_ will present at @IEEESSP on Monday 3pm, while David and I will be on stage at @offensive_con on Saturday 11am with more details! 1/6
1
4
28
@danielklischies
Daniel Klischies
8 months
I gave an introductory talk on baseband security, focusing on root-causes of vulnerabilities, at this year's @ruhrsec conference. Recording now available:
0
0
4
@ruhrsec
RuhrSec – IT Security Conference
11 months
🚀 Check out the #RuhrSec 2025 program! 💡 14 expert talks are waiting for you. 🎟️ Don’t miss out—get your ticket now and join us! 👉 https://t.co/3QMjYQ3n2U #itsecurity #itsicherheit #cybersecurity #cybersicherheit #itsecurityconference #bochum #NRW
0
4
6
@nSinusR
nSinus-R (@[email protected])
1 year
Excited to announce that we will present our latest work on baseband fuzzing at @BlackHatEvents USA this year! Join @dyonwg_ and me on a journey of fuzzing layer 2 and finding multiple critical OTA vulnerabilities! More info: https://t.co/HDBnRDmmCq See you in August!
1
12
52
@__nils_
Nils Bars
2 years
Humbled and grateful that our paper Fuzztruction received a Distinguished Paper Award and was the runner up to the Internet Defense Prize @USENIXSecurity #usesec23 Find the paper at https://t.co/JBZ9L3obGs Thanks @m_u00d8, @ScepticCtf, @74ck_0, @thorstenholz
0
12
46
@danielklischies
Daniel Klischies
2 years
(2/2) I'm thrilled to be presenting our results at the conference next week, Thursday 10.08 1:30pm, Track 1 (Cellular Networks). See you in Anaheim! (cc @m_u00d8, @ScepticCtf, Mikhail, @davidrupprecht1, @veelasha_m)
0
0
4
@danielklischies
Daniel Klischies
2 years
📣Our paper on undefined behavior in cellular specs has been accepted at #usesec23. We derive examples of undefined behavior from LTE specs, and use them to discover multiple baseband vulns, including a DoS via SMS. Preprint, Artifacts, Tutorial: https://t.co/RrS6GCL1uu (1/2)
1
14
47
@danielklischies
Daniel Klischies
4 years
I am experimenting with receiving SMS in LTE (via NAS messages, not via IMS), sent via srsRAN. Works fine for Mediatek-based phones. However, Huawei and Samsung modems seem to only receive/forward one message per Minute to the AP (while still sending an RP-ACK). Does sb know why?
1
3
6
@ScepticCtf
Tobias Scharnowski
4 years
This has been a really cool project to work on. As the MediaTek Baseband uses rather arcane Mips16e2 and DSP instructions, we (@danielklischies tinkered with me on this) added tooling support in Ghidra and Qemu to understand and get the Basebands up and running.
@Digital_Cold
Grant H
4 years
Our paper on emulating basebands for security analysis has been accepted at NDSS! We found multiple critical pre-auth vulnerabilities in the 2G and 4G implementations on Samsung and MediaTek basebands. Check out the paper or keep reading to learn moređź§µ https://t.co/BJ3FK0pSbM
3
4
27