Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
On the Nose - Bypassing Huawei's Fingerprint Authentication by Exploiting the TrustZone
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 The Goal
- 3 The modern mobile security architecture
- 4 The exploit chain
- 5 Disclaimer - Chipset determines the TEE
- 6 Huawei's Trustzone system architecture
- 7 Userland to Kernel
- 8 Bug #2- A custom unmap implementation?
- 9 Exploitation - Redirecting the fops table
- 10 Kernel to Trustlet
- 11 Into to the Secure World - Passing args to a Trustlet
- 12 Exploitation - Hijacking TEE_Malloc
- 13 Trusted Core Environment
- 14 Trusted Core - Finding Primitives
- 15 Disable Fingerprint Auth • Find trustle responsible for recognizing Fingerprints
- 16 Follow the userland daemon
- 17 Finding and patching