Completed
Communication
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Next Generation Mobile Rootkits
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Mobile rootkits
- 3 What is TrustZone?
- 4 About TrustZone
- 5 Trusted Execution Environments
- 6 Example: Netflix
- 7 Attacker Model
- 8 How does it work?
- 9 Memory in TrustZone
- 10 Boot process
- 11 By the way
- 12 Hardware support
- 13 Where to test?
- 14 Scheduling the rootkit
- 15 IRQ'interception
- 16 Secure World Memory Setup
- 17 Secure World Initialization
- 18 Monitor setup
- 19 Lockdown: SCR
- 20 Start operating system
- 21 Communication
- 22 Interoperability
- 23 Detection methods
- 24 Thank you for staying!