Главная
Study mode:
on
1
Introduction
2
Agenda
3
Embedded Security
4
Runtime Confirmation
5
Execution Environments
6
NS Bits
7
Privileges Separation
8
L1 L2 L3
9
Different software implementations
10
What is chosen actually useful
11
Samsungs implementation
12
Previous research
13
Architecture
14
Lifecycle
15
Attack Surface
16
Liberator
17
Emulator
18
EiffelUnicorn
19
Symbolic Execution
20
Vulnerability Overview
21
Attack Plan
22
Lack of Error
23
Vulnerability
24
Cisco
25
Map
26
Framework
27
Finding the Master Key
28
Retrieving the Master Key
29
Bypassing Signature Checks
30
Instrumentation of TrustZone
31
Debugging TrustZone
Description:
Explore an in-depth presentation on exploiting Samsung's ARM TrustZone implementation, focusing on leveraging new attack surfaces to hijack and exploit trusted components. Delve into the internals and interactions of Samsung-developed components, and examine various vulnerabilities that can be exploited to execute code at EL3, the highest privilege level on ARM-based systems. Learn about embedded security, runtime confirmation, execution environments, and privilege separation in ARM architectures. Discover Samsung's specific implementation, previous research, and the attack surface. Gain insights into tools like Liberator, Emulator, Eiffel, and Unicorn for vulnerability analysis. Understand the attack plan, including exploiting lack of error vulnerabilities, finding and retrieving the master key, bypassing signature checks, and instrumenting TrustZone. Conclude with techniques for debugging TrustZone components.

Breaking Samsung's ARM TrustZone

Black Hat
Add to list
0:00 / 0:00