Unearthing the TrustedCore - A Critical Review on Huawei’s Trusted Execution Environment

Unearthing the TrustedCore - A Critical Review on Huawei’s Trusted Execution Environment

USENIX via YouTube Direct link

Motivation

2 of 18

2 of 18

Motivation

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Unearthing the TrustedCore - A Critical Review on Huawei’s Trusted Execution Environment

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Motivation
  3. 3 Outline
  4. 4 Trusted Execution Environments (TEES)
  5. 5 ARM Trustzone on ARMVB-A Systems
  6. 6 TEEs in the Field (on Android)
  7. 7 Overview
  8. 8 TrustedCore - Normal World
  9. 9 TrustedCore-Secure World
  10. 10 Loading Encrypted Trusted Applications (cont.)
  11. 11 Protection of Crypto Keys
  12. 12 Scope & Consequences
  13. 13 Export-Protected Crypto Keys
  14. 14 The Key Encryption Key (KEK)
  15. 15 Memory Corruption in keymaster TA
  16. 16 Exploit Mitigations
  17. 17 Lessons Learned - Hardware-Protected Crypto Keys
  18. 18 Lessons Learned - Attack Surface

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.