MOBILE ROOTKITS: EXPLOITING AND ROOTKITTING ARM TRUSTZONE

MOBILE ROOTKITS: EXPLOITING AND ROOTKITTING ARM TRUSTZONE

Exploiting and rootkitting ARM-based devices gets more and more interesting. This talk will focus on the exploitation of TEEs (Trusted Execution Environments) running in ARM TrustZone to hide a TrustZone-based-rootkit (Presented at Black Hat EU 2013).

Presented by