Completed
Exploit Mitigations
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Unearthing the TrustedCore - A Critical Review on Huawei’s Trusted Execution Environment
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Motivation
- 3 Outline
- 4 Trusted Execution Environments (TEES)
- 5 ARM Trustzone on ARMVB-A Systems
- 6 TEEs in the Field (on Android)
- 7 Overview
- 8 TrustedCore - Normal World
- 9 TrustedCore-Secure World
- 10 Loading Encrypted Trusted Applications (cont.)
- 11 Protection of Crypto Keys
- 12 Scope & Consequences
- 13 Export-Protected Crypto Keys
- 14 The Key Encryption Key (KEK)
- 15 Memory Corruption in keymaster TA
- 16 Exploit Mitigations
- 17 Lessons Learned - Hardware-Protected Crypto Keys
- 18 Lessons Learned - Attack Surface