We sent one of us to scout the grounds of this year's @1ns0mn1h4ck.
From Android rollback attacks to AI-driven malware, here’s what stood out to us: eshard.com/posts/a-look-b…
💡 ARM TrustZone-based TEEs secure devices like smartphones; drones, but they have critical vulnerabilities
Join @0ddc0de at #hw_ioUSA2025 to analyze system designs, spot security flaws & explore isolation and confidentiality techniques
👉 hardwear.io/usa-2025/train…#TrustZoneTEE
📢 SPEAKERS ANNOUNCEMENT 📢
On Wednesday Nov. 6th, Marcel Busch @0ddc0de and Philippe Mao 🙋♂️, Postdoc and PhD at @EPFL HexHive lab, will propose a fascinating talk
🔥 GlobalConfusion: Trustzone Trusted Application 0-Days by Design 🔥
Abstract 👉 #02" target="_blank" rel="nofollow noopener">blackalps.ch/ba-24/talks.ph…
🔒 ARM TrustZone is the backbone of mobile devices 📱, and EL3XIR provides an effective framework for rehosting and fuzzing the secure monitor firmware of proprietary TrustZone-based TEEs
Join Marcel & @_chli_ at #hw_ioNL2024
👉 hardwear.io/netherlands-20…#fuzzing#mobilesecurity
Coming up at @USENIXSecurity, we have three exciting papers on Android security across all layers of the stack. Learn about fuzzing trusted components, type confusion in trusted APIs and a study on how trusted apps are updated. @EPFL_en@ICepflactu.epfl.ch/news/finding-s…
Downgrading trusted apps allows attackers to use N-days for attacking the trusted world. Sadly, @0ddc0de@USENIXSecurity discovered that rollback prevention is lacking on Android. Paper: nebelwelt.net/files/24SEC.pdf
Do you want 0days in Android Trusted Applications using the Global Platform API? Use @0ddc0de's binary static analysis @USENIXSecurity to find type confusions resulting in arbitrary writes. Paper: nebelwelt.net/files/24SEC4.p…