Faults in Our Bus - Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a groundbreaking research presentation on a novel bus fault attack that compromises Trusted Execution Environments (TEEs) in embedded systems. Delve into the vulnerabilities of SoC system buses, uncovering fault characteristics in both data and address buses. Learn how these vulnerabilities can be exploited to mount end-to-end attacks on commercial TEE implementations like OP-TEE. Examine loopholes in TEE specifications and Linux function return conventions that aid adversaries. Gain crucial insights into the need for revisiting API specifications and TEE implementations for embedded systems, considering adversaries capable of faulting not just processors and memory, but also system buses. Understand the importance of holistic security approaches that account for both software implementation and the execution environment in embedded systems.
Syllabus
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments
Taught by
Black Hat
Related Courses
Hardware SecurityUniversity of Maryland, College Park via Coursera Cryptography and Information Theory
University of Colorado System via Coursera Introduction to Software Side Channels and Mitigations
Graz University of Technology via edX Side-Channel Security: Developing a Side-Channel Mindset
Graz University of Technology via edX Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX