Breaking Samsung's Root of Trust - Exploiting Samsung S10 Secure Boot
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a detailed analysis of vulnerabilities discovered in Samsung's Secure Boot (S-Boot) process for the S10 smartphone in this 37-minute Black Hat conference presentation. Dive into the intricacies of Samsung's Knox Platform, designed to protect Android devices, and understand how the S-Boot mechanism ensures only stock images can be booted. Learn about the one-time programmable e-fuse (Knox bit) and its role in safeguarding sensitive data. Examine multiple vulnerabilities related to USB request handling in S-Boot, as uncovered by researchers Cheng-Yu Chao, Hung Chi Su, and Che-Yang Wu. Gain insights into potential security implications for the world's leading smartphone manufacturer and broaden your understanding of mobile device security measures.
Syllabus
Breaking Samsung's Root of Trust: Exploiting Samsung S10 Secure Boot
Taught by
Black Hat
Related Courses
Protecting Devices and Applications in Microsoft 365Pluralsight vSphere 6.7 Professional Part 04: Securing a Deployment
LinkedIn Learning VMware vSphere 7 Professional: 04 Securing a vSphere Deployment
LinkedIn Learning The One Weird Trick SecureROM Hates - Vol. 2
nullcon via YouTube I Boot when U-Boot
nullcon via YouTube