Главная
Study mode:
on
1
Intro
2
Motivation
3
Outline
4
Trusted Execution Environments (TEES)
5
ARM Trustzone on ARMVB-A Systems
6
TEEs in the Field (on Android)
7
Overview
8
TrustedCore - Normal World
9
TrustedCore-Secure World
10
Loading Encrypted Trusted Applications (cont.)
11
Protection of Crypto Keys
12
Scope & Consequences
13
Export-Protected Crypto Keys
14
The Key Encryption Key (KEK)
15
Memory Corruption in keymaster TA
16
Exploit Mitigations
17
Lessons Learned - Hardware-Protected Crypto Keys
18
Lessons Learned - Attack Surface
Description:
Explore a critical review of Huawei's Trusted Execution Environment (TEE) implementation, TrustedCore, in this award-winning conference talk. Delve into the reverse-engineering process of TC's components, their interconnections, and integration with the Android system. Uncover multiple severe design and implementation flaws affecting popular Huawei devices. Examine the Trusted Application (TA) loader, revealing vulnerabilities that compromise code confidentiality. Investigate the design of Huawei's keystore system and its impact on hardware-backed cryptography and full-disk encryption. Learn about an exploitable memory corruption within the keymaster TA, enabling arbitrary code execution within ARM TrustZone. Discover how researchers bypassed mitigation techniques like stack canaries and Address Space Layout Randomization (ASLR). Gain insights into the responsible disclosure process and the implications of these findings for mobile device security.

Unearthing the TrustedCore - A Critical Review on Huawei’s Trusted Execution Environment

USENIX
Add to list
0:00 / 0:00