Difference between revisions of "Android TrustZone"
Jump to navigation
Jump to search
m |
m |
||
Line 9: | Line 9: | ||
* http://bits-please.blogspot.com/2016/05/qsee-privilege-escalation-vulnerability.html |
* http://bits-please.blogspot.com/2016/05/qsee-privilege-escalation-vulnerability.html |
||
* http://bits-please.blogspot.com/2016/05/war-of-worlds-hijacking-linux-kernel.html |
* http://bits-please.blogspot.com/2016/05/war-of-worlds-hijacking-linux-kernel.html |
||
+ | * http://bits-please.blogspot.com/2016/06/trustzone-kernel-privilege-escalation.html |
||
Reconstructing a QSEE Trustlet as valid ELF: |
Reconstructing a QSEE Trustlet as valid ELF: |
Revision as of 13:48, 15 June 2016
A very valuable series of posts to understand TrustZone and more specifically QSEE
- http://bits-please.blogspot.com/2015/03/getting-arbitrary-code-execution-in.html
- http://bits-please.blogspot.com/2015/08/exploring-qualcomms-trustzone.html
- http://bits-please.blogspot.com/2015/08/full-trustzone-exploit-for-msm8974.html
- http://bits-please.blogspot.com/2015/08/android-linux-kernel-privilege.html
- http://bits-please.blogspot.com/2016/01/android-privilege-escalation-to.html
- http://bits-please.blogspot.com/2016/04/exploring-qualcomms-secure-execution.html
- http://bits-please.blogspot.com/2016/05/qsee-privilege-escalation-vulnerability.html
- http://bits-please.blogspot.com/2016/05/war-of-worlds-hijacking-linux-kernel.html
- http://bits-please.blogspot.com/2016/06/trustzone-kernel-privilege-escalation.html
Reconstructing a QSEE Trustlet as valid ELF:
Exploits
TrustZone more generally
- https://genode.org/documentation/articles/trustzone
- https://genode.org/documentation/articles/usb_armory
Presentations