AI Adoption - Drive Business Value and Organizational Impact
Gain a Splash of New Skills - Coursera+ Annual Nearly 45% Off
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Watch a detailed Black Hat conference presentation exploring security vulnerabilities in Samsung Galaxy A-series devices' boot chain. Follow along as security researchers demonstrate how they discovered and exploited multiple vulnerabilities, including a jpeg parser flaw in the Little Kernel bootloader, weaknesses in Samsung's Odin recovery protocol, and critical issues in the ARM Trusted Firmware. Learn about the techniques used to bypass secure boot, gain control over the Android system, and access secrets hidden in the secure world through reverse engineering and fuzzing. Understand the complete attack chain that allows writing to flash memory without authentication and breaking through the device's final security barrier.
Syllabus
Attacking Samsung Galaxy A* Boot Chain, and Beyond
Taught by
Black Hat