![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course aims to teach learners how to exploit vulnerabilities in Samsung's TrustZone implementation to hijack and manipulate trusted components. The course covers the internals and interactions of these components, various vulnerabilities, and how to execute code at the highest privilege level on an ARM-based system. The skills taught include understanding embedded security, runtime confirmation, execution environments, and symbolic execution. The teaching method involves explaining concepts and demonstrating exploitation techniques. This course is intended for individuals interested in cybersecurity, ARM architecture, and system-level security.
Syllabus
Introduction
Agenda
Embedded Security
Runtime Confirmation
Execution Environments
NS Bits
Privileges Separation
L1 L2 L3
Different software implementations
What is chosen actually useful
Samsungs implementation
Previous research
Architecture
Lifecycle
Attack Surface
Liberator
Emulator
EiffelUnicorn
Symbolic Execution
Vulnerability Overview
Attack Plan
Lack of Error
Vulnerability
Cisco
Map
Framework
Finding the Master Key
Retrieving the Master Key
Bypassing Signature Checks
Instrumentation of TrustZone
Debugging TrustZone
Taught by
Black Hat