Launch Your Cybersecurity Career in 6 Months
Launch a New Career with Certificates from Google, IBM & Microsoft
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Watch a detailed Black Hat conference presentation exploring security vulnerabilities in Samsung Galaxy A-series devices' boot chain. Follow along as security researchers demonstrate how they discovered and exploited multiple vulnerabilities, including a jpeg parser flaw in the Little Kernel bootloader, weaknesses in Samsung's Odin recovery protocol, and critical issues in the ARM Trusted Firmware. Learn about the techniques used to bypass secure boot, gain control over the Android system, and access secrets hidden in the secure world through reverse engineering and fuzzing. Understand the complete attack chain that allows writing to flash memory without authentication and breaking through the device's final security barrier.
Syllabus
Attacking Samsung Galaxy A* Boot Chain, and Beyond
Taught by
Black Hat