Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course aims to teach participants about Trusted Execution Environment (TEE) and how to discover vulnerabilities in trusted components provided by device manufacturers, specifically focusing on Qualcomm's TEE backed by ARM TrustZone. The course covers reverse engineering the Qualcomm TrustZone ecosystem, executing trusted apps in the Normal World (Android OS), loading patched apps into the Secure World, and adapting trusted apps for running on devices from different manufacturers. The teaching method involves a demonstration of the process of building a workable fuzzer for TrustZone apps. This course is intended for individuals interested in security research, particularly in the mobile data security domain.