Difference between revisions of "Android TrustZone"
Jump to navigation
Jump to search
(Created page with " A very valuable series of posts to understand TrustZone and more specifically QSEE * http://bits-please.blogspot.be/2015/03/getting-arbitrary-code-execution-in.html * http://...") |
m |
||
Line 7: | Line 7: | ||
* http://bits-please.blogspot.be/2016/01/android-privilege-escalation-to.html |
* http://bits-please.blogspot.be/2016/01/android-privilege-escalation-to.html |
||
* http://bits-please.blogspot.be/2016/04/exploring-qualcomms-secure-execution.html |
* http://bits-please.blogspot.be/2016/04/exploring-qualcomms-secure-execution.html |
||
+ | * http://bits-please.blogspot.be/2016/05/qsee-privilege-escalation-vulnerability.html |
||
Reconstructing a QSEE Trustlet as valid ELF: |
Reconstructing a QSEE Trustlet as valid ELF: |
Revision as of 18:20, 2 May 2016
A very valuable series of posts to understand TrustZone and more specifically QSEE
- http://bits-please.blogspot.be/2015/03/getting-arbitrary-code-execution-in.html
- http://bits-please.blogspot.be/2015/08/exploring-qualcomms-trustzone.html
- http://bits-please.blogspot.be/2015/08/full-trustzone-exploit-for-msm8974.html
- http://bits-please.blogspot.be/2015/08/android-linux-kernel-privilege.html
- http://bits-please.blogspot.be/2016/01/android-privilege-escalation-to.html
- http://bits-please.blogspot.be/2016/04/exploring-qualcomms-secure-execution.html
- http://bits-please.blogspot.be/2016/05/qsee-privilege-escalation-vulnerability.html
Reconstructing a QSEE Trustlet as valid ELF:
Exploits
TrustZone more generally
- https://genode.org/documentation/articles/trustzone
- https://genode.org/documentation/articles/usb_armory
Presentations