Achilles, we found 400 weaknesses in the QUALCOMM chip
With more than 3 billion users worldwide, smartphones are an integral, almost inseparable part of our daily lives.
As the mobile market continues to grow, retailers are competing to provide new features and better technological innovation in their latest devices. In support of this persistent drive for innovation, retailers often rely on third parties to provide the required hardware and software for their phones. One of the most common third-party solutions is a digital signal processor unit, commonly known as DSP chips.
In this presentation, we will look at the vulnerability that our company discovered in the chips of the well-known company Qualcomm Technologies. Its chips are used by a large number of mobile phone manufacturers. Let's take this vulnerability closer together.
As the mobile market continues to grow, retailers are competing to provide new features and better technological innovation in their latest devices. In support of this persistent drive for innovation, retailers often rely on third parties to provide the required hardware and software for their phones. One of the most common third-party solutions is a digital signal processor unit, commonly known as DSP chips.
In this presentation, we will look at the vulnerability that our company discovered in the chips of the well-known company Qualcomm Technologies. Its chips are used by a large number of mobile phone manufacturers. Let's take this vulnerability closer together.
Sign in to ITAPA Health&Care 2025
Tomáš Vobruba
For the last 3 years he has been working as a Technical Precision Specialist for the Slovak Republic at Check Point. Throughout his 20- years lasting professional carrier, he worked at AEC, where he gained a lot of experience in the security of information systems. He has received a number of certificates from professional training on Unix / Linux, antivirus products, system security and analysis, data encryption, and others. Vobruba leads technical training on threat prevention, encryption, network (Internet) communications and security, and firewall security issues.
See more info about the speaker