Blue Pill for Your Phone

Presented at Black Hat USA 2017, July 27, 2017, 3:50 p.m. (50 minutes).

In this research, we've explored attack surface of hypervisors and TrustZone monitor in modern ARM based phones, using Google Nexus 5X, Nexus 6P, and Pixel as primary targets. We will explain different attack scenarios using SMC and other interfaces, as well as interaction methods between TrustZone and hypervisor privilege levels.

We will explore attack vectors which could allow malicious operating system (EL1) level to escalate privileges to hypervisor (EL2) level and potentially install virtualization rootkit in the hypervisor. We will also explore attack vectors through SMC and other low level interfaces, interactions between TrustZone and hypervisor (EL2) privilege levels. To help with further low level ARM security research, we will release ARM support for CHIPSEC framework and new modules to test issues in ARM based hypervisors and TrustZone implementations, including SMC fuzzer.


Presenters:

  • Yuriy Bulygin - Researcher, Independent
    Yuriy Bulygin (@c7zero) has been the chief threat researcher at Intel Security/McAfee and led the Advanced Threat Research team. Previously, Yuriy led microprocessor vulnerability analysis team at Intel. Yuriy is the author of open source CHIPSEC framework.
  • Oleksandr Bazhaniuk - Researcher, Independent
    Oleksandr Bazhaniuk (@ABazhaniuk) is a independent security researcher. In the past member of the Advanced Threat Research team and Security Center of Excellence (SeCoE) at Intel Inc. His primary interests are low-level security, hardware and firmware security, exploitation and automation of binary analysis. His work has been presented at many conferences, including Black Hat, Recon, DefCon, CanSecWest, Troopers, USENIX. He is also a co-founder of DCUA, the first DefCon group in Ukraine and ctf team.

Links:

Similar Presentations: