Dec. 20, 2023, 5:53 p.m. | Black Hat

Black Hat www.youtube.com

As features of smartphones continue to advance, their SoCs become increasingly complex. In addition to the Application Processor (AP), the SoC also runs other cores such as baseband, camera, sensor hub and low power management module. As a result, permission control and security boundary management cannot only apply to a single processor, but require thoughtful consideration of all running processors. Exception level (EL) based solutions (e.g., ARM Trustzone) on a single processor are facing more and more threats from other …

addition application attacks baseband camera continue control escalation features low management permission power power management processor result security sensor smartphones soc socs system

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC