Главная
Study mode:
on
1
Intro
2
Today's Focus
3
System on Chip
4
Common Talking Points: Specification
5
Who Writes The Software?
6
OS Market Share
7
Android Fragmentation and Abandonware
8
Android: Plagued by Version Fragmentation
9
Apple: Version Fragmentation
10
Market Share of the Leaders
11
Foundations of Mobile Trust
12
System on a Chip
13
Trusted Execution Environments
14
Physical Attack Surface
15
Remote Attack Surface
16
TrustZone and TEE
17
TrustZone TEE
18
Modem and Baseband
19
Boot Loader / Secure Boot
20
Cross Device Impacts
21
Aside about BYOD & MOM
Description:
Explore the complex mobile threat landscape in this Black Hat conference talk. Dive into the assumptions and design paradigms of each player in the mobile space, examining their requirements and inherited problems. Gain a comprehensive understanding of mobile vulnerabilities and their implications, allowing for better assessment of current and future security risks. Investigate the entirety of the mobile ecosystem, from hardware components to operating systems and networks. Focus on core components across mobile vendors and operating systems, highlighting bugs, logic issues, and root problems affecting all mobile devices. Discuss limitations of mobile trusted computing and strategies to protect data and devices. Examine smartphone hardware platforms from trusted computing and hardware integrity perspectives, exploring how skilled attackers can compromise trust at the hardware level. Learn about System on Chip, Trusted Execution Environments, physical and remote attack surfaces, TrustZone, modems, basebands, boot loaders, and secure boot processes. Consider cross-device impacts and implications for BYOD (Bring Your Own Device) and Mobile Device Management (MDM) policies. Read more

Can You Trust Me Now? An Exploration Into the Mobile Threat Landscape

Black Hat
Add to list
00:00
-03:34