Margin Research (Page 1)

Margin Research Blog

Writings on Security, Research, and Technology

You Can’t Spell WebRTC without RCE - Part 3
Aug 12, 2024

You Can’t Spell WebRTC without RCE - Part 3

This is the third and final part of our blog post series on Signal and iOS exploitation via the insertion of synthetic vulnerabilities. Part one explored Signal and WebRTC, detailing the injected vulnerabilities and the process of adding them. In part two we leverage these vulnerabilities to exfiltrate the Signal

Ian Dupont
By Ian Dupont
Michael C
By Michael C
You Can't Spell WebRTC without RCE - Part 2
Jul 26, 2024

You Can't Spell WebRTC without RCE - Part 2

This is the second part in our three-part series on exploring WebRTC, Signal-iOS, and iOS exploitation. The first post in this series surveyed WebRTC's implementation of various protocols, injected arbitrary read and arbitrary write vulnerabilities, and set up a research environment to trigger the vulnerabilities. This post continues

Ian Dupont
By Ian Dupont
You Can't Spell WebRTC without RCE - Part 1
Jul 19, 2024

You Can't Spell WebRTC without RCE - Part 1

Injecting and Exploiting Synthetic Remote Vulnerabilities to explore Signal-iOS and WebRTC It’s another average Friday morning and my iPhone shows 705 unread Signal messages. Signal has not completely supplanted my use of iMessage, but it does dominate communications with industry peers and privacy-conscious friends. If you are a cybersecurity

Ian Dupont
By Ian Dupont
Disassembling Dalvik
May 29, 2024

Disassembling Dalvik

In this post, we announce the release of a small library for disassembling Dalvik bytecode. This serves as a foundation for building static analysis tooling for Android applications and system services in Rust. Read on for an example graphview application, or just check out the crate’s source and documentation

Evan Richter
By Evan Richter
We know how to detect XZ and we know how to solve it
Apr 4, 2024

We know how to detect XZ and we know how to solve it

Security posture is relative. It is improper to designate something as perfectly secure, and anyone who claims otherwise is selling you something. We achieve a degree of security that lets us sleep at night by creating the most challenging maze possible for any would-be attackers. This strategy, often referred to

Ian Roos
By Ian Roos
Same Same, but Different
Feb 29, 2024

Same Same, but Different

What the i-Soon leak reveals about the Chinese offensive cyber capability industry.

Winnona Bernsen
By Winnona Bernsen
Russia’s largest hacking conference: Biggest hits from Positive Hack Days 2023
Dec 5, 2023

Russia’s largest hacking conference: Biggest hits from Positive Hack Days 2023

Russia’s largest hacking conference, Positive Hack Days, recently took place in Moscow from Friday, May 19 to Saturday, May 20. The event was held at Gorky Park, a large park and cultural complex in Moscow, and split into an area freely open to the public and a village area

Justin Sherman
By Justin Sherman
Emulating and Exploiting UEFI Firmware
Sep 29, 2023

Emulating and Exploiting UEFI Firmware

One major difficulty of doing low-level security research is the lack of a testing and debugging environments. When testing regular userspace programs written in C and other high-level programming languages, there are a plethora of debugging tools like gdb to run, inspect, and modify a running process. Dynamically inspecting software

Joe Lothan
By Joe Lothan
Entity Resolution in Reagent
Jun 29, 2023

Entity Resolution in Reagent

One of the biggest challenges in many modern technologies is Entity Resolution, the practice of figuring out when two separate entities are actually the same thing, such as Git contributors. We leverage LLMs in our graph databases to solve this problem for GitHub contributors and more!

Matthew Filbert
By Matthew Filbert
Page 1 of 4
arrow-up icon