YoVDO

Fuzzing Embedded - Trusted Operating Systems Using AFL

Offered By: nullcon via YouTube

Tags

nullcon Courses Hardware Security Courses Fuzzing Courses Embedded Systems Security Courses OP-TEE Courses

Course Description

Overview

Explore a comprehensive talk on fuzzing Trusted Execution Environments (TEEs) in embedded systems using AFL (American Fuzzy Lop). Delve into the increasing complexity and potential vulnerabilities of TEEs as they take on more security-critical tasks. Learn about a syzkaller-inspired fuzzing framework for OP-TEE that utilizes an unmodified version of AFL with coverage tracking integrated into the TEE kernel. Discover the challenges of fuzzing a non-virtualized trusted operating system on an actual device and how to overcome them. Gain insights into creating effective initial inputs for AFL seeding. Understand how this approach can be applied to various trusted operating systems beyond OP-TEE. Presented by Martijn Bogaard, a Senior Security Analyst at Riscure, this talk offers valuable knowledge for those interested in embedded systems security, hardware security, and low-level software analysis.

Syllabus

Fuzzing Embedded (Trusted) Operating Systems Using AFL | Martijn Bogaard | nullcon Goa 2019


Taught by

nullcon

Related Courses

CompTIA Security+ (SY0-601) Cert Prep: 7 Endpoint Security Design and Implementation
LinkedIn Learning
SSCP Cert Prep: 7 Systems and Application Security
LinkedIn Learning
The Internet of Insecure Things - 10 Most Wanted List
YouTube
ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube
Low Level BootROM Protocol Fuzzing Secure Memory Regions
Hack In The Box Security Conference via YouTube