Breaking Samsung's Root of Trust - Exploiting Samsung S10 Secure Boot
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a detailed analysis of vulnerabilities discovered in Samsung's Secure Boot (S-Boot) process for the S10 smartphone in this 37-minute Black Hat conference presentation. Dive into the intricacies of Samsung's Knox Platform, designed to protect Android devices, and understand how the S-Boot mechanism ensures only stock images can be booted. Learn about the one-time programmable e-fuse (Knox bit) and its role in safeguarding sensitive data. Examine multiple vulnerabilities related to USB request handling in S-Boot, as uncovered by researchers Cheng-Yu Chao, Hung Chi Su, and Che-Yang Wu. Gain insights into potential security implications for the world's leading smartphone manufacturer and broaden your understanding of mobile device security measures.
Syllabus
Breaking Samsung's Root of Trust: Exploiting Samsung S10 Secure Boot
Taught by
Black Hat
Related Courses
Enterprise and Infrastructure SecurityNew York University (NYU) via Coursera Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Hacking Laboratuvarınızı Oluşturun
Udemy CISM Cert Prep: 3 Information Security Program Development and Management
LinkedIn Learning Ethical Hacking: Mobile Devices and Platforms
LinkedIn Learning