Program

/

CODE BLUE 2025

Time Table

AI Accelerated Exploiting: Compromising MTE Enabled Pixel from DSP Coprocessor

DAY 1

9:55-10:35

Last year, we discovered the first known security vulnerability in Google’s proprietary NPU (Neural Processing Unit) processor used in the Pixel 8. Google patched the issue earlier this year. This NPU is undocumented and had never been publicly analyzed before, presenting a significant challenge to reverse engineering and exploitation.

Although our initial attempts to emulate the processor were unsuccessful, we persisted by using dynamic instrumentation techniques and other tricks to gain insight into its behavior. Through this effort, we uncovered a critical bug that allowed us to achieve full kernel code execution and bypass all mitigations on the Pixel 8 including MTE.

To build a complete exploit chain, we also identified and chained two additional vulnerabilities, enabling exploitation from a less privileged context. Our research demonstrates a deep exploration into a previously opaque component, and reveals new attack surfaces in modern Android hardware.

  • Location :

    • Track 1(HALL B)

  • Category :

    • Technical

  • Share :

Speakers

  • ビン・ジョン・ジェン の写真

    Bing Jhong Jheng

    ビン・ジョン・ジェン

    Jheng Bing Jhong is a principal researcher of STAR LABS, focusing on Linux, VM and mobile security, he was the speaker of HITCON, DEFCON, OffbyOne and POC 2024

  • ゼンペン・パン(aka Peterpan0927) の写真

    ZhenPeng Pan aka Peterpan0927

    ゼンペン・パン(aka Peterpan0927)

    Pan Zhenpeng is a principal researcher at STAR LABS SG, focusing on Mobile(iOS/Android) and Web security, he was the speaker of Zer0Con, POC{2022, 2024}, OffensiveCon, 0x41Con, Offbyone, HITCON and HITB Armory.