On the Nose: Bypassing Huawei’s Fingerprint authentication by exploiting the TrustZone

Presented at DerbyCon 8.0 Evolution (2018), Oct. 7, 2018, 1 p.m. (50 minutes).

Nick is a member of the Shellphish CTF team and employed by Raytheon CSI as a vulnerability researcher. Nick has published papers on automated bug finding and exploitation as well Android security, and competed in the DARPA Cyber Grand Challenge with team Shellphish.


Presenters:

Links:

Similar Presentations: