TrustZone-M Security Vulnerabilities in Microcontroller TEEs - Lessons Learned
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a comprehensive conference talk that delves into the security challenges of Arm Cortex-M Microcontrollers (MCUs) and the TrustZone-M technology. Learn about the limitations of CPU-centric security in TrustZone-M and the potential vulnerabilities in modern MCU-based Trusted Execution Environments (TEEs). Discover how to bypass CPU-level isolation primitives and understand the design of TEE core mechanisms for enhanced protection. Witness a live demonstration of an exploit that breaches TEE isolation boundaries to retrieve cryptographic keys from Secure Partitions and the Trusted kernel. Gain valuable insights into the complexities of implementing system-wide isolation in TrustZone-M systems and the importance of understanding PSA isolation levels for securing IoT devices at scale.
Syllabus
What the TrustZone-M Doesn't See, the MCU Does Grieve Over: Lessons Learned
Taught by
Black Hat
Related Courses
ARM Cortex-M Interfacing with Keyboards and LCD's (FREE! )Udemy Mastering RTOS: Hands on FreeRTOS and STM32Fx with Debugging
Udemy Accelerate ML Development With Cloud-Based Arm Cortex-M Models
tinyML via YouTube Building and Enabling Voice Control with ARM Cortex-M
tinyML via YouTube wolfBoot - Open Source Secure Boot and Remote Firmware Updates in Safety-critical Embedded Systems
Linux Foundation via YouTube