Reflections on Trusting TrustZone

  Рет қаралды 6,395

Black Hat

Black Hat

Күн бұрын

By Dan Rosenberg
"TrustZone has emerged as a leading option for security-critical tasks on ARM devices. It has been billed as a ""100% secure solution"" for restricting access to sensitive device hardware components and securely storing highly privileged information. As a result, TrustZone is used on millions of mobile devices for diverse tasks including managing secure boot, storing DRM keys on behalf of digital content providers, supporting mobile payments, and performing integrity validation on the live operating system kernel.
This talk will take a deep technical dive into the inner workings of a major vendor's TrustZone kernel, which is currently deployed on millions of Android devices. After providing a review of prior work in TrustZone exploitation, this talk will describe a previously unpublished vulnerability in this TrustZone implementation, and provide details on steps taken to exploit this vulnerability. The talk will conclude with a discussion of the ramifications of this vulnerability and others like it, including a live demonstration of using it to permanently unlock the bootloader of a major Android phone."

Пікірлер: 2
@zofe
@zofe 5 жыл бұрын
SMC Table Extension Attack @ 31:03
@linux-tut
@linux-tut 2 жыл бұрын
OP-TEE OS hands-on for beginners: kzbin.info/www/bejne/o2m6nYaXo6x3ras
Breaking Samsung's ARM TrustZone
43:18
Black Hat
Рет қаралды 11 М.
36C3 -  TrustZone-M(eh): Breaking ARMv8-M's security
57:22
media.ccc.de
Рет қаралды 12 М.
Useful gadget for styling hair 🤩💖 #gadgets #hairstyle
00:20
FLIP FLOP Hacks
Рет қаралды 11 МЛН
Inside Out 2: Who is the strongest? Joy vs Envy vs Anger #shorts #animation
00:22
48 Dirty Little Secrets Cryptographers Don’t Want You To Know
50:58
Demystifying the Secure Enclave Processor
47:39
Black Hat
Рет қаралды 20 М.
Platform Security-A Detailed Comparison of RISC-V to ARM’s TrustZone
23:03
RISC-V International
Рет қаралды 10 М.
Systems Architecture, Design, Engineering, and Verification
1:08:09
Association for Computing Machinery (ACM)
Рет қаралды 53 М.
GRR: Find All the Badness, Collect All the Things
57:50
Black Hat
Рет қаралды 12 М.
Something Rotten in the State of Data Centers
40:27
Black Hat
Рет қаралды 8 М.
Securing Embedded Linux Systems with TPM 2.0 - Philip Tricca, Intel
51:17
The Linux Foundation
Рет қаралды 28 М.
OP-TEE is Ready: Let's Use It! - Rouven Czerwinski, Pengutronix e.K.
42:30
The Linux Foundation
Рет қаралды 4,9 М.
34C3 -  Microarchitectural Attacks on Trusted Execution Environments
55:02
Useful gadget for styling hair 🤩💖 #gadgets #hairstyle
00:20
FLIP FLOP Hacks
Рет қаралды 11 МЛН