Breaking Samsung's ARM TrustZone

Описание к видео Breaking Samsung's ARM TrustZone

Using Samsung's TrustZone implementation as a target, this presentation explains and demonstrates how this new attack surface can be leveraged to hijack and exploit trusted components. After explaining the internals and interactions of these components developed by Samsung, different vulnerabilities will be detailed and exploited to execute code at EL3, the highest privilege level on an ARM-based system.

By Maxime Peterlin, Alexandre Adamski and Joffrey Guilbon

Full Abstract & Presentation Materials: https://www.blackhat.com/us-19/briefi...

Комментарии

Информация по комментариям в разработке