YoVDO

Dissecting the Modern Android Data Encryption Scheme

Offered By: Recon Conference via YouTube

Tags

Android Security Courses Cryptography Courses Data Encryption Courses Mobile Device Security Courses Vulnerability Analysis Courses Trusted Execution Environment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Android's user data encryption in this conference talk from Recon 2023. Delve into the logic behind key generation and storage for File-Based Encryption, following the implementation steps in the Android Open Source Project (AOSP). Discover how elements from the file system, Trusted Execution Environment (TEE), and Secure Element combine with user credentials to create final encryption keys. Examine two attack scenarios targeting Gatekeeper and Weaver mechanisms, utilizing known software vulnerabilities on Samsung A22 and Pixel 3a devices. Gain comprehensive insights into user data encryption and authentication, covering design principles, implementation details, and attacker strategies. Learn from security researchers Maxime Rossi Bellom and Damiano Melotti as they present their findings on modern Android data encryption schemes, providing an up-to-date reference for fellow researchers reviewing these mechanisms and their internals.

Syllabus

Recon 2023 - Maxime Rossi and Damiano Melotti - Dissecting the Modern Android Data Encryption Scheme


Taught by

Recon Conference

Related Courses

IoT Product Security
Cybrary
Trusted Execution Environments Meet the Blockchain
Simons Institute via YouTube
Cache Side Channel Attack - Exploitability and Countermeasures
Black Hat via YouTube
Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube