YoVDO

TrustZone-M Security Vulnerabilities in Microcontroller TEEs - Lessons Learned

Offered By: Black Hat via YouTube

Tags

Trusted Execution Environment Courses Internet of Things Courses Cybersecurity Courses Embedded Systems Courses Microcontrollers Courses Hardware Security Courses ARM Cortex-M Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk that delves into the security challenges of Arm Cortex-M Microcontrollers (MCUs) and the TrustZone-M technology. Learn about the limitations of CPU-centric security in TrustZone-M and the potential vulnerabilities in modern MCU-based Trusted Execution Environments (TEEs). Discover how to bypass CPU-level isolation primitives and understand the design of TEE core mechanisms for enhanced protection. Witness a live demonstration of an exploit that breaches TEE isolation boundaries to retrieve cryptographic keys from Secure Partitions and the Trusted kernel. Gain valuable insights into the complexities of implementing system-wide isolation in TrustZone-M systems and the importance of understanding PSA isolation levels for securing IoT devices at scale.

Syllabus

What the TrustZone-M Doesn't See, the MCU Does Grieve Over: Lessons Learned


Taught by

Black Hat

Related Courses

IoT Product Security
Cybrary
Trusted Execution Environments Meet the Blockchain
Simons Institute via YouTube
Cache Side Channel Attack - Exploitability and Countermeasures
Black Hat via YouTube
Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube