Breaking Samsung's ARM TrustZone

uXH5LJGRwXI/default.jpg

Using Samsung's TrustZone implementation as a target, this presentation explains and demonstrates how this new attack surface can be leveraged to hijack and exploit trusted components. After explaining the internals and interactions of these components developed by Samsung, different vulnerabilities will be detailed and exploited to execute code at EL3, the highest privilege level on an ARM-based system.

By Maxime Peterlin, Alexandre Adamski and Joffrey Guilbon

Full Abstract & Presentation Materials: https://www.blackhat.com/us-19/briefi...

uXH5LJGRwXI/default.jpg
Breaking Samsung's ARM TrustZone Breaking Samsung's ARM TrustZone Reviewed by Anonymous on January 15, 2020 Rating: 5