Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems

Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems

IEEE Symposium on Security and Privacy via YouTube Direct link

How Attackers Attack TEES

26 of 31

26 of 31

How Attackers Attack TEES

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Lots of Scattered TEE Vulnerability Reports
  3. 3 Contributions
  4. 4 Source of Vulnerability Information
  5. 5 TEE Vulnerabilities Are Severe
  6. 6 All Software Layers Have Been Affected
  7. 7 TEE Architecture
  8. 8 Architecture Issues
  9. 9 1.1. Wide Interfaces In TEE Components
  10. 10 1.2. Excessively Large TEE TCBS
  11. 11 1.3. Map Normal-World Physical Memory
  12. 12 1.4. Lackluster Memory Protection
  13. 13 1.5. III-Supported TA revocation
  14. 14 Three Classes of Vulnerabilities
  15. 15 Implementation Issues
  16. 16 Validation Bugs
  17. 17 2.1. Bugs Within the Secure Monitor
  18. 18 Functional Bugs
  19. 19 2.2. Bugs in Memory Protection
  20. 20 Extrinsic Bugs
  21. 21 2.5. Concurrency
  22. 22 TEE Hardware
  23. 23 Hardware Issues
  24. 24 3.2. Energy Management Mechanisms
  25. 25 3.3. Leaking Information through Caches
  26. 26 How Attackers Attack TEES
  27. 27 TEE Defenses
  28. 28 Architectural Defenses
  29. 29 Implementation Defenses
  30. 30 Hardware Defenses
  31. 31 In Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.