Presented at
Black Hat USA 2013,
Unknown date/time
(Unknown duration).
Exploiting and rootkitting ARM-based devices gets more and more interesting. This talk will focus on the exploitation of TEEs (Trusted Execution Environments) running in ARM TrustZone to hide a TrustZone-based-rootkit (Presented at Black Hat EU 2013).
Presenters:
-
Thomas Roth / stacksmashing
- Leveldown Security
as Thomas Roth
Thomas Roth is a security researcher and consultant from Germany. His main interests are exploiting techniques, low-level and embedded reverse engineering, and cryptography implementations. He built a distributed encryption breaking framework, hacked payment terminals and implemented tools for ARM reverse engineering.
Links:
Similar Presentations: