Launching Feedback-Driven Fuzzing on TrustZone TEE
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore the intricacies of TrustZone technology and its implementation in modern ARM-driven smartphones through this 43-minute conference talk from the Hack In The Box Security Conference. Dive into the concept of hardware isolation for secure data processing, understanding the division between Normal World and Secure World. Learn about the potential security implications of breaching TrustZone, including compromising Root Of Trust and achieving rootkit persistence. Focus on techniques for accessing TrustZone from Android userspace in Samsung Galaxy smartphones, specifically examining the Trustonic implementation of Trusted Execution Environment (TEE). Discover the vulnerabilities in trusted applications (trustlets) and gain insights into an innovative approach for automatically uncovering these vulnerabilities using feedback-driven fuzzing with AFL. Benefit from the speaker's expertise in binary security analysis, CPU architectures, and operating systems as you explore universal approaches for bug hunting in complex technology stacks.
Syllabus
#HITBGSEC D2: Launching Feedback-Driven Fuzzing On TrustZone TEE - Andrey Akimov
Taught by
Hack In The Box Security Conference
Related Courses
Browser Hacking With ANGLEHack In The Box Security Conference via YouTube Can A Fuzzer Match A Human
Hack In The Box Security Conference via YouTube Biometrics System Hacking in the Age of the Smart Vehicle
Hack In The Box Security Conference via YouTube ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube Fuzzing the MCU of Connected Vehicles for Security and Safety
Hack In The Box Security Conference via YouTube