Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Leveraging Firmware Bugs to Break Trusted Execution Environments (TEEs)

Black Hat via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore a 37-minute Black Hat conference talk that delves into critical vulnerabilities within AMD's SEV-SNP technology's firmware implementation on the Platform Security Processor. Learn about novel exploitation techniques that can lead to complete compromise of confidentiality, allowing attackers to decrypt guest memory on affected systems. Discover how these firmware vulnerabilities can potentially enable attackers to modify encrypted memory contents, resulting in complete loss of integrity for running guest systems. Security researcher Tom Dohrmann demonstrates how modern Trusted Execution Environments (TEEs) can be compromised through their reliance on privileged firmware for implementing complex features, coordinating hardware components, and establishing roots of trust.

Syllabus

All Your Secrets Belong to Us: Leveraging Firmware Bugs to Break TEEs

Taught by

Black Hat

Reviews

Start your review of Leveraging Firmware Bugs to Break Trusted Execution Environments (TEEs)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.