![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course teaches learners how to write Trusted Applications in Rust, focusing on utilizing the language's security features such as memory safety, type safety, and error handling. The course covers topics like TrustZone TEE, TEE OS Protections, and the challenges of writing secure C code. Participants will learn how to generate Rust bindings, write a Rust library, and compile, link, and sign their code. The intended audience for this course includes developers interested in system-level programming and security.
Syllabus
Intro
Use Cases
The TrustZone TEE
TrustZone in Practice
TEE OS Protections
Writing (good) C is Hard
Example: WideVine Trusted Application
Example: Samsung OTP Buffer Overflow
What's Rust?
Why Rust?
Rust / CFFI
Learning Rust
Get an OS
Generate Rust Bindings
Write a Rust Library
Compile, Link, Sign
Conclusions
Taught by
Black Hat