Breaking Samsung's ARM TrustZone

Subscribers:
6,120
Published on ● Video Link: https://www.youtube.com/watch?v=Lv7ZhHL9LE8



Duration: 43:18
26 views
0


Maxime Peterlin | Security Engineer, Quarkslab
Alexandre Adamski | Security Engineer, Quarkslab
Joffrey Guilbon | Security Engineer, Quarkslab
Location: South Seas CDF
Date: Thursday, August 8 | 5:00pm-6:00pm
Format: 50-Minute Briefings
Tracks: Mobile, Hardware/Embedded

The increasing popularity of connected devices in recent years has led manufacturers to put a greater emphasis on security, finding themselves in need of robust designs that would protect their users.

From these requirements emerged the ARM TrustZone, a system-wide hardware isolation technology. It introduces a trusted Secure World that can process code and data while ensuring their integrity and confidentiality. This Secure World can also watch over the user-controlled (and therefore untrusted) Normal World to verify its integrity, similarly to the mechanism implemented in Samsung's TIMA.

It can also access hardware peripherals, such as keyboards, screens, or crypto-processors in a secure and isolated manner to create trusted UIs, implement DRMs, etc. All the sensitive data and the critical interruptions are directly handled by the Secure World without ever passing through the Normal World.

However, the usage of this technology comes at a cost. By widening the attack surface and exposing privileged components, TrustZone can potentially introduce a single point of failure that allows the compromission of the entire system.

Using Samsung's TrustZone implementation as a target, this presentation explains and demonstrates how this new attack surface can be leveraged to hijack and exploit trusted components. After explaining the internals and interactions of these components developed by Samsung, different vulnerabilities will be detailed and exploited to execute code at EL3, the highest privilege level on an ARM-based system.


Black Hat - USA - 2019 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security







Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
information
hack
online
crime
code
web
concept
thief
protection
scam
fraud
malware
secure
identity
phishing
software
access
safety
theft
firewall
communication
business
privacy
account
spy
programmer
program
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
Maxime Peterlin
Alexandre Adamski
Joffrey Guilbon