Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Attacking Samsung Galaxy A* Boot Chain and Beyond - Security Vulnerabilities and Exploits

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Watch a detailed Black Hat conference presentation exploring security vulnerabilities in Samsung Galaxy A-series devices' boot chain. Follow along as security researchers demonstrate how they discovered and exploited multiple vulnerabilities, including a jpeg parser flaw in the Little Kernel bootloader, weaknesses in Samsung's Odin recovery protocol, and critical issues in the ARM Trusted Firmware. Learn about the techniques used to bypass secure boot, gain control over the Android system, and access secrets hidden in the secure world through reverse engineering and fuzzing. Understand the complete attack chain that allows writing to flash memory without authentication and breaking through the device's final security barrier.

Syllabus

Attacking Samsung Galaxy A* Boot Chain, and Beyond

Taught by

Black Hat

Reviews

Start your review of Attacking Samsung Galaxy A* Boot Chain and Beyond - Security Vulnerabilities and Exploits

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.