Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Investigating and Breaking Widevine on QTEE

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the intricacies of Widevine DRM and Qualcomm's QTEE TrustZone implementation in this Black Hat conference presentation. Delve into the high-value nature of these technologies and gain insights into their fundamental concepts. Learn how to identify command handling logic and uncover vulnerabilities within the system. Discover the memory model of a QTEE Trusted Application (TA), including command delivery and buffer sharing between worlds. Understand techniques for information leakage, breaking ASLR, and accessing TA from user-controlled locations. Follow the step-by-step process of exploiting the Widevine TA and extracting data from QTEE's trusted storage (SFS). While prior knowledge is beneficial, it is not mandatory for this 27-minute deep dive into cybersecurity research and exploitation techniques.

Syllabus

Wideshears: Investigating and Breaking Widevine on QTEE

Taught by

Black Hat

Reviews

Start your review of Investigating and Breaking Widevine on QTEE

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.