The following is the archive of public research we have released in the past years about various topics, covering a wide range of security and design issues.
Although such content is rich of technical information, we try our best to make our papers readable and accessible to the largest audience.
PDF files automatically converted to HTML using pdf2htmlEX and with image quality reduced for optimizing bandwidth.
The papers are available on our blog too.
|18 Sep 2014|
Description of the security vulnerabilities that affected the Steam lobbies and all the games using the Steam Matchmaking functionalities.
Summary: A single attacker was able to easily deny the online experience of many multiplayer games sold on Steam.
|10 Jul 2014|
How a malware or an exploit can use the Steam local service to escalate its privileges.
Summary: Unpatched local privilege escalation issues in the Steam Client Service.
|04 Jul 2014|
Overview and details about the security issues found in the Steam voice framework.
Summary: Description of various remote security vulnerabilities that affected the voip API used by Steam and various games.
|26 Mar 2014|
Video showing a design vulnerability affecting all the 2013 models of Philips SmartTV (6/7/8/9xxx), where the WiFi Miracast feature is enabled by default with the fixed password "miracast" and no PIN or request of permission for the new incoming WiFi connections.
|10 Dec 2013|
This paper details a vulnerability affecting NVIDIA mental ray, which allows an attacker to take control over a mental ray based render farm.
|20 May 2013|
This paper details several issues affecting different game engines. All the vulnerabilities discussed in this paper are 0-days, at time of writing.
|10 Apr 2013|
Security research conducted against a set of online poker solutions, highlighting the current status of this lucrative industry.
"Online Gaming (also known as Online Gambling and iGaming) is a successfully growing market, and Online Poker is its main sector with millions of players all around the world betting with real money..."
|22 Mar 2013|
In this paper we will detail a remote code execution vulnerability in Battlefield Play4Free exploitable via web browser on some Operating Systems. The vulnerability was first presented by REVULN at Black Hat Europe 2013, as part of a talk covering several interesting aspects related to games security.
|22 Mar 2013|
White paper of the presentation given at Black Hat Europe 2013
|15 Mar 2013|
In this paper we will uncover and demonstrate a novel and interesting way to convert local bugs and features in remotely exploitable security vulnerabilities by using the well known EA Origin platform as attack vector against remote systems.
|13 Nov 2012|
In this paper we describe a pre-auth server-side NULL pointer dereference vulnerability in Call Of Duty: Modern Warfare 3, which is due to an issue related to the DemonWare query packets. This vulnerability can be exploited to perform Denial of Service (DoS) attacks against game servers.
|15 Oct 2012|
In this paper we will uncover and demonstrate a novel and interesting way to convert local bugs and features in remotely exploitable security vulnerabilities by using the well known Steam platform as attack vector against remote systems.
The following are the slides of the talks we performed at some of the conferences listed on the Conferences section.
|27 May 2014|
Presented at PHDays IV 2014, from page 45 are available the full details of various vulnerabilities affecting:
|17 Jan 2014|
Presented at S4 (SCADA Security Scientific Symposium) 2014
|11 Nov 2013|
Presented at CounterMeasure 2013
The following are some of the conferences that we have attended so far, in some occasions also as speakers.
The slides of the conferences in which we gave a presentation are available in the Presentations section.
29 May 2014 - Amsterdam, Netherlands
Reloading Java Exploits: Long Live Old JRE!
14 January 2014 - Miami, USA
Securing ICS Applications When Vendors Refuse Or Are Slow To Produce a Security Patch
07 November 2013 - Ottawa, Canada
Smashing Exploit Detectors: The Java Exploits Case
16 Jan 2013 - Miami, USA
Experimental Project for SCADA/HMI Defense