Completed
Monitor setup
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Next Generation Mobile Rootkits
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Mobile rootkits
- 3 What is TrustZone?
- 4 About TrustZone
- 5 Trusted Execution Environments
- 6 Example: Netflix
- 7 Attacker Model
- 8 How does it work?
- 9 Memory in TrustZone
- 10 Boot process
- 11 By the way
- 12 Hardware support
- 13 Where to test?
- 14 Scheduling the rootkit
- 15 IRQ'interception
- 16 Secure World Memory Setup
- 17 Secure World Initialization
- 18 Monitor setup
- 19 Lockdown: SCR
- 20 Start operating system
- 21 Communication
- 22 Interoperability
- 23 Detection methods
- 24 Thank you for staying!