YoVDO

Breaking Samsung's Root of Trust - Exploiting Samsung S10 Secure Boot

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Mobile Security Courses Secure Boot Courses USB Security Courses

Course Description

Overview

Explore a detailed analysis of vulnerabilities discovered in Samsung's Secure Boot (S-Boot) process for the S10 smartphone in this 37-minute Black Hat conference presentation. Dive into the intricacies of Samsung's Knox Platform, designed to protect Android devices, and understand how the S-Boot mechanism ensures only stock images can be booted. Learn about the one-time programmable e-fuse (Knox bit) and its role in safeguarding sensitive data. Examine multiple vulnerabilities related to USB request handling in S-Boot, as uncovered by researchers Cheng-Yu Chao, Hung Chi Su, and Che-Yang Wu. Gain insights into potential security implications for the world's leading smartphone manufacturer and broaden your understanding of mobile device security measures.

Syllabus

Breaking Samsung's Root of Trust: Exploiting Samsung S10 Secure Boot


Taught by

Black Hat

Related Courses

Predator to Prey - Tracking Criminals with Trojans and Data Mining for Fun and Profit
YouTube
Plug & Pray Today - Understanding USB Insecurity in Versions 1 through C
IEEE via YouTube
Hackademia - The 2018 Literature Review
BSidesLV via YouTube
Implementing an USB Host Driver Fuzzer
WEareTROOPERS via YouTube
ProvUSB - Block-level Provenance-Based Data Protection for USB Storage Devices
Association for Computing Machinery (ACM) via YouTube