TrustZone-M - Breaking ARMv8-M's Security
Offered By: media.ccc.de via YouTube
Course Description
Overview
Explore hardware attacks on the latest generation of ARM Cortex-M processors in this 57-minute conference talk from the 36th Chaos Communication Congress (36C3). Dive into fault-injection attacks that bypass security features of modern IoT and embedded processors, including breaking TrustZone-M on new ARMv8-M processors. Learn about an open-source FPGA platform for glitching, making these techniques more accessible and cost-effective. Discover how to conduct glitching attacks on real-world targets, prepare devices for glitching, and find potential vulnerabilities. Witness demonstrations of bypassing integrated chip security features such as re-enabling locked JTAG, circumventing secure bootloaders, recovering symmetric crypto keys, and fully bypassing TrustZone-M security. See a practical example of breaking the reference secure bootloader of the Microchip SAM L11, a new TrustZone-M enabled ARM Cortex-M processor, using minimal equipment. Gain insights into integrating fault-injection testing into secure development lifecycles and understand the implications for modern device security.
Syllabus
36C3 - TrustZone-M(eh): Breaking ARMv8-M's security
Taught by
media.ccc.de
Related Courses
A developer's guide to the Internet of Things (IoT)IBM via Coursera Enterprise and Infrastructure Security
New York University (NYU) via Coursera Getting Started with the Internet of Things (IoT)
Microsoft via edX AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX Components And Applications Of Internet Of Things
Indian Institute of Technology Patna via Swayam