YoVDO

Faults in Our Bus - Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems

Offered By: Black Hat via YouTube

Tags

Trusted Execution Environment Courses Side Channel Attacks Courses IoT security Courses Embedded Systems Security Courses Fault Attacks Courses OP-TEE Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking research presentation on a novel bus fault attack that compromises Trusted Execution Environments (TEEs) in embedded systems. Delve into the vulnerabilities of SoC system buses, uncovering fault characteristics in both data and address buses. Learn how these vulnerabilities can be exploited to mount end-to-end attacks on commercial TEE implementations like OP-TEE. Examine loopholes in TEE specifications and Linux function return conventions that aid adversaries. Gain crucial insights into the need for revisiting API specifications and TEE implementations for embedded systems, considering adversaries capable of faulting not just processors and memory, but also system buses. Understand the importance of holistic security approaches that account for both software implementation and the execution environment in embedded systems.

Syllabus

Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments


Taught by

Black Hat

Related Courses

Hardware Security
University of Maryland, College Park via Coursera
Cryptography and Information Theory
University of Colorado System via Coursera
Introduction to Software Side Channels and Mitigations
Graz University of Technology via edX
Side-Channel Security: Developing a Side-Channel Mindset
Graz University of Technology via edX
Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX