Completed
How Attackers Attack TEES
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Lots of Scattered TEE Vulnerability Reports
- 3 Contributions
- 4 Source of Vulnerability Information
- 5 TEE Vulnerabilities Are Severe
- 6 All Software Layers Have Been Affected
- 7 TEE Architecture
- 8 Architecture Issues
- 9 1.1. Wide Interfaces In TEE Components
- 10 1.2. Excessively Large TEE TCBS
- 11 1.3. Map Normal-World Physical Memory
- 12 1.4. Lackluster Memory Protection
- 13 1.5. III-Supported TA revocation
- 14 Three Classes of Vulnerabilities
- 15 Implementation Issues
- 16 Validation Bugs
- 17 2.1. Bugs Within the Secure Monitor
- 18 Functional Bugs
- 19 2.2. Bugs in Memory Protection
- 20 Extrinsic Bugs
- 21 2.5. Concurrency
- 22 TEE Hardware
- 23 Hardware Issues
- 24 3.2. Energy Management Mechanisms
- 25 3.3. Leaking Information through Caches
- 26 How Attackers Attack TEES
- 27 TEE Defenses
- 28 Architectural Defenses
- 29 Implementation Defenses
- 30 Hardware Defenses
- 31 In Conclusion