This three-day training is structured to provide you with a comprehensive learning experience that combines theoretical insights and practical application. During the official training hours, you will attend engaging lectures designed to deepen your understanding of ARM TrustZone TEE security, covering key concepts, vulnerabilities, and offensive techniques.
In addition to the lectures, you’ll participate in hands-on practical exercises that reinforce the material covered. These exercises, including a dynamic Capture-the-Flag (CTF), can be completed both during and outside of the official training hours, allowing you the flexibility to explore and experiment at your own pace. This structure ensures you gain both the knowledge and the practical skills to effectively analyze and exploit TrustZone TEE vulnerabilities.
During the three-day training, we will cover a broad range of TEE security topics including
- Foundation
- What is a TEE?
- TrustZone, SGX, SEV, and friends
- ARM TrustZone Overview
- Use cases
- Security model
- Attack surface
- TEEs in-the-wild: the Android TEE Ecosystem
- Trusted Applications
- Talking to TAs: the GlobalPlatform APIs
- Sharing memory pitfalls (the semantic gap)
- GlobalConfusion attacks
- Time-of-Check-Time-of-Use attacks
- Rollback attacks
- Code confidentiality
- Cryptographic key protection pitfalls
- Exploit mitigations
- Fuzzing TAs
- Secure Monitors
- ARM Trusted Firmware-A
- Design and implementation flaws in SMC handlers
- Fuzzing Secure Monitors
- Trusted Operating Systems
- System call interface
- GlobalPlatform APIs
- Design and implementation flaws in Trusted OS system calls and drivers