Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems
Offered By: IEEE via YouTube
Course Description
Overview
Syllabus
Intro
Lots of Scattered TEE Vulnerability Reports
Contributions
Source of Vulnerability Information
TEE Vulnerabilities Are Severe
All Software Layers Have Been Affected
TEE Architecture
Architecture Issues
1.1. Wide Interfaces In TEE Components
1.2. Excessively Large TEE TCBS
1.3. Map Normal-World Physical Memory
1.4. Lackluster Memory Protection
1.5. III-Supported TA revocation
Three Classes of Vulnerabilities
Implementation Issues
Validation Bugs
2.1. Bugs Within the Secure Monitor
Functional Bugs
2.2. Bugs in Memory Protection
Extrinsic Bugs
2.5. Concurrency
TEE Hardware
Hardware Issues
3.2. Energy Management Mechanisms
3.3. Leaking Information through Caches
How Attackers Attack TEES
TEE Defenses
Architectural Defenses
Implementation Defenses
Hardware Defenses
In Conclusion
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld SystemsVanderbilt University via Coursera The Caltech-JPL Summer School on Big Data Analytics
California Institute of Technology via Coursera Automated Visual Software Analytics
openHPI Software Architecture & Design
Georgia Institute of Technology via Udacity Software Architecture for the Internet of Things
EIT Digital via Coursera