Completed
Vulnerability Overview
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Breaking Samsung's ARM TrustZone
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 Embedded Security
- 4 Runtime Confirmation
- 5 Execution Environments
- 6 NS Bits
- 7 Privileges Separation
- 8 L1 L2 L3
- 9 Different software implementations
- 10 What is chosen actually useful
- 11 Samsungs implementation
- 12 Previous research
- 13 Architecture
- 14 Lifecycle
- 15 Attack Surface
- 16 Liberator
- 17 Emulator
- 18 EiffelUnicorn
- 19 Symbolic Execution
- 20 Vulnerability Overview
- 21 Attack Plan
- 22 Lack of Error
- 23 Vulnerability
- 24 Cisco
- 25 Map
- 26 Framework
- 27 Finding the Master Key
- 28 Retrieving the Master Key
- 29 Bypassing Signature Checks
- 30 Instrumentation of TrustZone
- 31 Debugging TrustZone