YoVDO

The Road to Qualcomm Trust Zone Apps Fuzzing

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Reverse Engineering Courses Fuzzing Courses Trusted Execution Environment Courses

Course Description

Overview

Explore the intricacies of Trusted Execution Environment (TEE) and its role in protecting critical mobile device data in this conference talk from Recon 2019. Delve into the speaker's methodology for automatically discovering vulnerabilities in trusted components within Qualcomm's TEE, which is backed by ARM TrustZone. Learn about the isolated virtual Secure World running on Qualcomm's dedicated OS and how trusted apps handle mobile data security. Discover the challenges and techniques involved in reverse engineering the Qualcomm TrustZone ecosystem, including executing trusted apps in the Normal World, bypassing Qualcomm's Chain of Trust, and adapting apps for different manufacturers' devices. Gain insights into the process of building a functional fuzzer for TrustZone apps and understand why these apps are prime targets for fuzzing-based vulnerability research due to their internal structure and TEE architecture.

Syllabus

Recon 2019 - The Road to Qualcomm Trust Zone apps fuzzing by Slava Makkaveev


Taught by

Recon Conference

Related Courses

Dal Reverse engineering alla stampa 3D
University of Naples Federico II via Federica
Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam
Generative Design for Industrial Applications
Autodesk via Coursera
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam