Completed
Map
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Breaking Samsung's ARM TrustZone
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 Embedded Security
- 4 Runtime Confirmation
- 5 Execution Environments
- 6 NS Bits
- 7 Privileges Separation
- 8 L1 L2 L3
- 9 Different software implementations
- 10 What is chosen actually useful
- 11 Samsungs implementation
- 12 Previous research
- 13 Architecture
- 14 Lifecycle
- 15 Attack Surface
- 16 Liberator
- 17 Emulator
- 18 EiffelUnicorn
- 19 Symbolic Execution
- 20 Vulnerability Overview
- 21 Attack Plan
- 22 Lack of Error
- 23 Vulnerability
- 24 Cisco
- 25 Map
- 26 Framework
- 27 Finding the Master Key
- 28 Retrieving the Master Key
- 29 Bypassing Signature Checks
- 30 Instrumentation of TrustZone
- 31 Debugging TrustZone