YoVDO

Breaking Samsung's Root of Trust - Exploiting Samsung S10 Secure Boot

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Mobile Security Courses Secure Boot Courses USB Security Courses

Course Description

Overview

Explore a detailed analysis of vulnerabilities discovered in Samsung's Secure Boot (S-Boot) process for the S10 smartphone in this 37-minute Black Hat conference presentation. Dive into the intricacies of Samsung's Knox Platform, designed to protect Android devices, and understand how the S-Boot mechanism ensures only stock images can be booted. Learn about the one-time programmable e-fuse (Knox bit) and its role in safeguarding sensitive data. Examine multiple vulnerabilities related to USB request handling in S-Boot, as uncovered by researchers Cheng-Yu Chao, Hung Chi Su, and Che-Yang Wu. Gain insights into potential security implications for the world's leading smartphone manufacturer and broaden your understanding of mobile device security measures.

Syllabus

Breaking Samsung's Root of Trust: Exploiting Samsung S10 Secure Boot


Taught by

Black Hat

Related Courses

Check Point Jump Start: Harmony Mobile
Checkpoint via Coursera
Check Point Jump Start: Harmony Mobile
Checkpoint via edX
Next-Gen Security: Mobile, IoT, and Cloud
University System of Maryland via edX
Advanced Cybersecurity
LearnKartS via Coursera
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera