YoVDO

Faults in Our Bus - Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems

Offered By: Black Hat via YouTube

Tags

Trusted Execution Environment Courses Side Channel Attacks Courses IoT security Courses Embedded Systems Security Courses Fault Attacks Courses OP-TEE Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking research presentation on a novel bus fault attack that compromises Trusted Execution Environments (TEEs) in embedded systems. Delve into the vulnerabilities of SoC system buses, uncovering fault characteristics in both data and address buses. Learn how these vulnerabilities can be exploited to mount end-to-end attacks on commercial TEE implementations like OP-TEE. Examine loopholes in TEE specifications and Linux function return conventions that aid adversaries. Gain crucial insights into the need for revisiting API specifications and TEE implementations for embedded systems, considering adversaries capable of faulting not just processors and memory, but also system buses. Understand the importance of holistic security approaches that account for both software implementation and the execution environment in embedded systems.

Syllabus

Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments


Taught by

Black Hat

Related Courses

UEFI Secure Boot in U-Boot
Linux Foundation via YouTube
Fuzzing Embedded - Trusted Operating Systems Using AFL
nullcon via YouTube
Shadow-Box v2 - The Practical and Omnipotent Sandbox for ARM
Black Hat via YouTube
Maintaining a Community BSP Layer: Updating Meta-Tegra Through Major Changes
Linux Foundation via YouTube
How ARM Systems are Booted - An Introduction to the ARM Boot Flow
Linux Foundation via YouTube