Breaking Samsung's Root of Trust - Exploiting Samsung S10 Secure Boot
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a detailed analysis of vulnerabilities discovered in Samsung's Secure Boot (S-Boot) process for the S10 smartphone in this 37-minute Black Hat conference presentation. Dive into the intricacies of Samsung's Knox Platform, designed to protect Android devices, and understand how the S-Boot mechanism ensures only stock images can be booted. Learn about the one-time programmable e-fuse (Knox bit) and its role in safeguarding sensitive data. Examine multiple vulnerabilities related to USB request handling in S-Boot, as uncovered by researchers Cheng-Yu Chao, Hung Chi Su, and Che-Yang Wu. Gain insights into potential security implications for the world's leading smartphone manufacturer and broaden your understanding of mobile device security measures.
Syllabus
Breaking Samsung's Root of Trust: Exploiting Samsung S10 Secure Boot
Taught by
Black Hat
Related Courses
Predator to Prey - Tracking Criminals with Trojans and Data Mining for Fun and ProfitYouTube Plug & Pray Today - Understanding USB Insecurity in Versions 1 through C
IEEE via YouTube Hackademia - The 2018 Literature Review
BSidesLV via YouTube Implementing an USB Host Driver Fuzzer
WEareTROOPERS via YouTube ProvUSB - Block-level Provenance-Based Data Protection for USB Storage Devices
Association for Computing Machinery (ACM) via YouTube