Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Breaking Samsung's Root of Trust - Exploiting Samsung S10 Secure Boot

Black Hat via YouTube

Overview

Explore a detailed analysis of vulnerabilities discovered in Samsung's Secure Boot (S-Boot) process for the S10 smartphone in this 37-minute Black Hat conference presentation. Dive into the intricacies of Samsung's Knox Platform, designed to protect Android devices, and understand how the S-Boot mechanism ensures only stock images can be booted. Learn about the one-time programmable e-fuse (Knox bit) and its role in safeguarding sensitive data. Examine multiple vulnerabilities related to USB request handling in S-Boot, as uncovered by researchers Cheng-Yu Chao, Hung Chi Su, and Che-Yang Wu. Gain insights into potential security implications for the world's leading smartphone manufacturer and broaden your understanding of mobile device security measures.

Syllabus

Breaking Samsung's Root of Trust: Exploiting Samsung S10 Secure Boot

Taught by

Black Hat

Reviews

Start your review of Breaking Samsung's Root of Trust - Exploiting Samsung S10 Secure Boot

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.