Breaking Samsung's ARM TrustZone

Breaking Samsung's ARM TrustZone

Black Hat via YouTube Direct link

Architecture

13 of 31

13 of 31

Architecture

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Breaking Samsung's ARM TrustZone

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Agenda
  3. 3 Embedded Security
  4. 4 Runtime Confirmation
  5. 5 Execution Environments
  6. 6 NS Bits
  7. 7 Privileges Separation
  8. 8 L1 L2 L3
  9. 9 Different software implementations
  10. 10 What is chosen actually useful
  11. 11 Samsungs implementation
  12. 12 Previous research
  13. 13 Architecture
  14. 14 Lifecycle
  15. 15 Attack Surface
  16. 16 Liberator
  17. 17 Emulator
  18. 18 EiffelUnicorn
  19. 19 Symbolic Execution
  20. 20 Vulnerability Overview
  21. 21 Attack Plan
  22. 22 Lack of Error
  23. 23 Vulnerability
  24. 24 Cisco
  25. 25 Map
  26. 26 Framework
  27. 27 Finding the Master Key
  28. 28 Retrieving the Master Key
  29. 29 Bypassing Signature Checks
  30. 30 Instrumentation of TrustZone
  31. 31 Debugging TrustZone

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.