Breaking Samsung's Root of Trust: Exploiting Samsung S10 Secure Boot
Being the highest market share smartphone manufacturer, Samsung conducts a series of protection on Android called Knox Platform to ensure the security of its smartphones. During the booting process, Samsung uses S-boot (Secure Boot) to make sure it can only boot a stocked image. If the device tries to boot a custom image, it will trip a one-time programmable bit e-fuse (a.k.a Knox bit). Once a trustzone app (trustlet) detects the Knox bit tripped, it will delete the encryption key for the sensitive data to prevent unauthorized data access to the locked phone. In this presentation, we'll present several vulnerabilities we found in S-Boot that are related to USB request handling.
By Cheng-Yu Chao, Hung Chi Su and Che-Yang Wu
Full Abstract & Presentation Materials: https://www.blackhat.com/us-20/briefings/schedule/#breaking-samsungs-root-of-trust-exploiting-samsung-s-secure-boot-20290
Видео Breaking Samsung's Root of Trust: Exploiting Samsung S10 Secure Boot канала Black Hat
By Cheng-Yu Chao, Hung Chi Su and Che-Yang Wu
Full Abstract & Presentation Materials: https://www.blackhat.com/us-20/briefings/schedule/#breaking-samsungs-root-of-trust-exploiting-samsung-s-secure-boot-20290
Видео Breaking Samsung's Root of Trust: Exploiting Samsung S10 Secure Boot канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Stealthily Access Your Android Phones: Bypass the Bluetooth Authentication](https://i.ytimg.com/vi/6J3weqoiads/default.jpg)
![Demigod: The Art of Emulating Kernel Rootkits](https://i.ytimg.com/vi/Zh_Dfd-ukEQ/default.jpg)
![Flutter Tutorial for Beginners - Build iOS and Android Apps with Google's Flutter & Dart](https://i.ytimg.com/vi/GLSG_Wh_YWc/default.jpg)
![IoT Skimmer: Energy Market Manipulation through High-Wattage IoT Botnets](https://i.ytimg.com/vi/Df4tPM6aGcA/default.jpg)
![Word 2016 Tutorial Complete for Professionals and Students](https://i.ytimg.com/vi/IaiZc0jomz4/default.jpg)
![The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation](https://i.ytimg.com/vi/lR0nh-TdpVg/default.jpg)
![Hardware root of trust with Google Cloud IoT Core and Microchip](https://i.ytimg.com/vi/A32RFbkozFc/default.jpg)
![You have No Idea Who Sent that Email: 18 Attacks on Email Sender Authentication](https://i.ytimg.com/vi/ar_lVqkWcHk/default.jpg)
![Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev](https://i.ytimg.com/vi/6Chp12sEnWk/default.jpg)
![PKI - trust & chain of trust -why, who and how?](https://i.ytimg.com/vi/LPxeYtMDxl0/default.jpg)
![A Decade After Stuxnet's Printer Vulnerability: Printing is Still the Stairway to Heaven](https://i.ytimg.com/vi/CHWSewPDfhs/default.jpg)
![Repurposing Neural Networks to Generate Synthetic Media for Information Operations](https://i.ytimg.com/vi/M-d_IYv81gE/default.jpg)
![Programming in Visual Basic .Net How to Connect Access Database to VB.NET](https://i.ytimg.com/vi/cwDqjmSmtMQ/default.jpg)
![Hardware Security - CompTIA Security+ SY0-501 - 3.3](https://i.ytimg.com/vi/MdLKu4t_RwU/default.jpg)
![Como Solucionar AVISO LOGO INICIAL - TRUCO Samsung Bootloader por FIN REVELADO](https://i.ytimg.com/vi/9MmsAK5c8fg/default.jpg)
![OpenCV Course - Full Tutorial with Python](https://i.ytimg.com/vi/oXlwWbU8l2o/default.jpg)
![Pulling Back the Curtain on Airport Security: Can a Weapon Get Past TSA?](https://i.ytimg.com/vi/hbqVNlwfjxo/default.jpg)
![Hacking the Supply Chain – The Ripple20 Vulnerabilities Haunt Tens of Millions of Critical Devices](https://i.ytimg.com/vi/wo_YhLBVkrY/default.jpg)
![Recovery y Root - Android 11 One UI 3.X - Samsung Galaxy S10 Series](https://i.ytimg.com/vi/iTZFsE7QByc/default.jpg)
![Photoshop for Beginners | FREE COURSE](https://i.ytimg.com/vi/IyR_uYsRdPs/default.jpg)