Securing the Airwaves - Emulation, Fuzzing, and Reverse Engineering of iPhone Baseband
WEareTROOPERS via YouTube
MIT Sloan AI Adoption: Build a Playbook That Drives Real Business ROI
Lead AI Strategy with UCSB's Agentic AI Program — Microsoft Certified
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore advanced security research techniques for iPhone baseband systems through emulation, fuzzing, and reverse engineering methodologies. Learn how to analyze and secure cellular communication components by examining the baseband processor that handles radio frequency operations in mobile devices. Discover practical approaches to identifying vulnerabilities in critical telecommunications infrastructure, understand the architecture of iPhone baseband systems, and master specialized tools and techniques used by security researchers to evaluate wireless communication security. Gain insights into the challenges of baseband security research, including the complexities of cellular protocol implementation and the potential attack vectors that exist within mobile device radio subsystems.
Syllabus
TROOPERS25: Securing the Airwaves Emulation, Fuzzing, and Reverse Engineering of iPhone Baseband
Taught by
WEareTROOPERS