Mobile rootkits: Exploiting and rootkitting ARM TrustZone

Presented at Black Hat USA 2013, Unknown date/time (Unknown duration).

Exploiting and rootkitting ARM-based devices gets more and more interesting. This talk will focus on the exploitation of TEEs (Trusted Execution Environments) running in ARM TrustZone to hide a TrustZone-based-rootkit (Presented at Black Hat EU 2013).


Presenters:

  • Thomas Roth / stacksmashing - Leveldown Security   as Thomas Roth
    Thomas Roth is a security researcher and consultant from Germany. His main interests are exploiting techniques, low-level and embedded reverse engineering, and cryptography implementations. He built a distributed encryption breaking framework, hacked payment terminals and implemented tools for ARM reverse engineering.

Links:

Similar Presentations: