Free courses from frontend to fullstack and AI
Foundations of Data Visualization - Self Paced Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a comprehensive conference talk that delves into the security challenges of Arm Cortex-M Microcontrollers (MCUs) and the TrustZone-M technology. Learn about the limitations of CPU-centric security in TrustZone-M and the potential vulnerabilities in modern MCU-based Trusted Execution Environments (TEEs). Discover how to bypass CPU-level isolation primitives and understand the design of TEE core mechanisms for enhanced protection. Witness a live demonstration of an exploit that breaches TEE isolation boundaries to retrieve cryptographic keys from Secure Partitions and the Trusted kernel. Gain valuable insights into the complexities of implementing system-wide isolation in TrustZone-M systems and the importance of understanding PSA isolation levels for securing IoT devices at scale.
Syllabus
What the TrustZone-M Doesn't See, the MCU Does Grieve Over: Lessons Learned
Taught by
Black Hat