paint-brush
Uncovering the Vulnerabilities of Qualcomm DSPby@checkpoint

Uncovering the Vulnerabilities of Qualcomm DSP

by Check Point Software19mDecember 13th, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Qualcomm-proprietary Remote Procedure Call (RPC) mechanism used to enable remote function calls between the CPU and DSP. Snapdragon 855 (SM8150) SoC, embedded in mobile phones such as Pixel 4, Samsung S10, Xiaomi Mi 9, LG G8, and OnePlus 7, includes Kryo CPU, Adreno 640, and four separate DSPs, each devoted to a specific application space: sensor, modem, audio (aDSP), and compute (cDSP) The security issues that we discovered are applicable to both.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Uncovering the Vulnerabilities of Qualcomm DSP
Check Point Software HackerNoon profile picture
Check Point Software

Check Point Software

@checkpoint

Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.

L O A D I N G
. . . comments & more!

About Author

Check Point Software HackerNoon profile picture
Check Point Software@checkpoint
Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here