YoVDO

Fuzzing Embedded - Trusted Operating Systems Using AFL

Offered By: nullcon via YouTube

Tags

nullcon Courses Hardware Security Courses Fuzzing Courses Embedded Systems Security Courses OP-TEE Courses

Course Description

Overview

Explore a comprehensive talk on fuzzing Trusted Execution Environments (TEEs) in embedded systems using AFL (American Fuzzy Lop). Delve into the increasing complexity and potential vulnerabilities of TEEs as they take on more security-critical tasks. Learn about a syzkaller-inspired fuzzing framework for OP-TEE that utilizes an unmodified version of AFL with coverage tracking integrated into the TEE kernel. Discover the challenges of fuzzing a non-virtualized trusted operating system on an actual device and how to overcome them. Gain insights into creating effective initial inputs for AFL seeding. Understand how this approach can be applied to various trusted operating systems beyond OP-TEE. Presented by Martijn Bogaard, a Senior Security Analyst at Riscure, this talk offers valuable knowledge for those interested in embedded systems security, hardware security, and low-level software analysis.

Syllabus

Fuzzing Embedded (Trusted) Operating Systems Using AFL | Martijn Bogaard | nullcon Goa 2019


Taught by

nullcon

Related Courses

Faults in Our Bus - Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems
Black Hat via YouTube
How ARM Systems are Booted - An Introduction to the ARM Boot Flow
Linux Foundation via YouTube
Maintaining a Community BSP Layer: Updating Meta-Tegra Through Major Changes
Linux Foundation via YouTube
OP-TEE is Ready - Let's Use It
Linux Foundation via YouTube
OP-TEE: Using TrustZone to Protect Our Own Secrets
Linux Foundation via YouTube