极术公开课
本PPT由极术社区提供,如需要观看回放请前往极术社区
元宵节折纸
Ethan Zhang
Security Marketing Manager
Arm Security
Technology Overview
The Need for “high-
川味正宗红烧肥肠
Security”
Premium rvices require an ever-increasing level of curity
梦见玫瑰花Android
Strongbox
Cellular ID
CSPs
Enterpri
storage
Home
蜜枣粽
automation
MCUs DRM
Wearables
Wired
comms
Security Exploits 101
•Data and Control Flow integrity bugs are the root cau of curity issues •Overflow, Memory Corruption, Execute Code失眠的拼音
•Conquences of fundamental bugs lead to exploits in modern SW codebas •Bypass Something, Gain Information/Privilege, Denial of Service
How much curity to fit your needs?急速奔跑
SW & HW Attacks
•Physical access to device –JTAG, Bus, IO Pins,
•Time, money & equipment
Software Attacks & lightweight hardware attacks
•Buffer overflows •Interrupts •
Malware
Communication Attacks •Man In The Middle •Weak RNG
•Code vulnerabilities
Cost/effort to attack
Cost/effort to cure
毕竟英语
做元宵TLS/SSL
Security subsystem
& enclave
TrustZone bad TEE/PSA
Secure Element
*Trusted Execution Environment / Secure Partitioning Manager