Dec. 20, 2023, 5:53 p.m. | Black Hat

Black Hat www.youtube.com

As features of smartphones continue to advance, their SoCs become increasingly complex. In addition to the Application Processor (AP), the SoC also runs other cores such as baseband, camera, sensor hub and low power management module. As a result, permission control and security boundary management cannot only apply to a single processor, but require thoughtful consideration of all running processors. Exception level (EL) based solutions (e.g., ARM Trustzone) on a single processor are facing more and more threats from other …

addition application attacks baseband camera continue control escalation features low management permission power power management processor result security sensor smartphones soc socs system

Azure DevSecOps Cloud Engineer II

@ Prudent Technology | McLean, VA, USA

Security Engineer III - Python, AWS

@ JPMorgan Chase & Co. | Bengaluru, Karnataka, India

SOC Analyst (Threat Hunter)

@ NCS | Singapore, Singapore

Managed Services Information Security Manager

@ NTT DATA | Sydney, Australia

Senior Security Engineer (Remote)

@ Mattermost | United Kingdom

Penetration Tester (Part Time & Remote)

@ TestPros | United States - Remote