Faults in Our Bus - Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a groundbreaking research presentation on a novel bus fault attack that compromises Trusted Execution Environments (TEEs) in embedded systems. Delve into the vulnerabilities of SoC system buses, uncovering fault characteristics in both data and address buses. Learn how these vulnerabilities can be exploited to mount end-to-end attacks on commercial TEE implementations like OP-TEE. Examine loopholes in TEE specifications and Linux function return conventions that aid adversaries. Gain crucial insights into the need for revisiting API specifications and TEE implementations for embedded systems, considering adversaries capable of faulting not just processors and memory, but also system buses. Understand the importance of holistic security approaches that account for both software implementation and the execution environment in embedded systems.
Syllabus
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments
Taught by
Black Hat
Related Courses
UEFI Secure Boot in U-BootLinux Foundation via YouTube Fuzzing Embedded - Trusted Operating Systems Using AFL
nullcon via YouTube Shadow-Box v2 - The Practical and Omnipotent Sandbox for ARM
Black Hat via YouTube Maintaining a Community BSP Layer: Updating Meta-Tegra Through Major Changes
Linux Foundation via YouTube How ARM Systems are Booted - An Introduction to the ARM Boot Flow
Linux Foundation via YouTube