Главная
Study mode:
on
1
Intro
2
Mobile rootkits
3
What is TrustZone?
4
About TrustZone
5
Trusted Execution Environments
6
Example: Netflix
7
Attacker Model
8
How does it work?
9
Memory in TrustZone
10
Boot process
11
By the way
12
Hardware support
13
Where to test?
14
Scheduling the rootkit
15
IRQ'interception
16
Secure World Memory Setup
17
Secure World Initialization
18
Monitor setup
19
Lockdown: SCR
20
Start operating system
21
Communication
22
Interoperability
23
Detection methods
24
Thank you for staying!
Description:
Explore the world of next-generation mobile rootkits in this Black Hat EU 2013 conference talk. Delve into the use of hardware security features in last-generation ARM processors to create and conceal rootkits that are virtually undetectable by operating systems. Learn about TrustZone technology, Trusted Execution Environments, and their applications in mobile security. Discover the attacker model, memory management in TrustZone, and the boot process for these advanced rootkits. Gain insights into hardware support, testing environments, and rootkit scheduling techniques. Examine IRQ interception, Secure World setup, and communication methods. Understand the challenges of interoperability and detection methods for these sophisticated mobile threats. Benefit from the speaker's practical experience in developing and hiding an actual rootkit using these cutting-edge techniques.

Next Generation Mobile Rootkits

Black Hat
Add to list