Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Demystifying the Secure Enclave Processor

Автор: Black Hat

Загружено: 2016-11-22

Просмотров: 23424

Описание:

by Tarjei Mandt & Mathew Solnik & David Wang

The secure enclave processor (SEP) was introduced by Apple as part of the A7 SOC with the release of the iPhone 5S, most notably to support their fingerprint technology, Touch ID. SEP is designed as a security circuit configured to perform secure services for the rest of the SOC, with with no direct access from the main processor. In fact, the secure enclave processor runs it own fully functional operating system - dubbed SEPOS - with its own kernel, drivers, services, and applications. This isolated hardware design prevents an attacker from easily recovering sensitive data (such as fingerprint information and cryptographic keys) from an otherwise fully compromised device.

Despite almost three years have passed since its inception, little is still known about the inner workings of the SEP and its applications. The lack of public scrutiny in this space has consequently led to a number of misconceptions and false claims about the SEP.

In this presentation, we aim to shed some light on the secure enclave processor and SEPOS. In particular, we look at the hardware design and boot process of the secure enclave processor, as well as the SEPOS architecture itself. We also detail how the iOS kernel and the SEP exchange data using an elaborate mailbox mechanism, and how this data is handled by SEPOS and relayed to its services and applications. Last, but not least, we evaluate the SEP attack surface and highlight some of the findings of our research, including potential attack vectors.

Demystifying the Secure Enclave Processor

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Hacking Next-Gen ATMs: From Capture to Cashout

Hacking Next-Gen ATMs: From Capture to Cashout

Breaking FIDO: Are Exploits in There?

Breaking FIDO: Are Exploits in There?

Architecture All Access: Modern CPU Architecture Part 1 – Key Concepts | Intel Technology

Architecture All Access: Modern CPU Architecture Part 1 – Key Concepts | Intel Technology

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

Fried Apples: Jailbreak DIY

Fried Apples: Jailbreak DIY

СРОЧНО! КУЧЕР:

СРОЧНО! КУЧЕР: "Это просто позор". Что случилось на пресс-конференции Трампа и Зеленского

37C3 -  Operation Triangulation: What You Get When Attack iPhones of Researchers

37C3 - Operation Triangulation: What You Get When Attack iPhones of Researchers

Protect your Keys with the Secure Enclave

Protect your Keys with the Secure Enclave

ARMageddon: How Your Smartphone CPU Breaks Software-Level Security and Privacy

ARMageddon: How Your Smartphone CPU Breaks Software-Level Security and Privacy

HEIST: HTTP Encrypted Information can be Stolen Through TCP-Windows

HEIST: HTTP Encrypted Information can be Stolen Through TCP-Windows

Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process

Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process

Side-Channel Attacks on Everyday Applications

Side-Channel Attacks on Everyday Applications

Platform Security–A Detailed Comparison of RISC-V to ARM’s TrustZone

Platform Security–A Detailed Comparison of RISC-V to ARM’s TrustZone

36C3 -  Uncover, Understand, Own - Regaining Control Over Your AMD CPU

36C3 - Uncover, Understand, Own - Regaining Control Over Your AMD CPU

Что будет с экономикой России в 2026: рецессия, рост налогов, девальвация рубля и заморозка вкладов

Что будет с экономикой России в 2026: рецессия, рост налогов, девальвация рубля и заморозка вкладов

БЕЗОПАСНОСТЬ APPLE - МИФ? | РАЗБОР

БЕЗОПАСНОСТЬ APPLE - МИФ? | РАЗБОР

Путин напирает, Лавров лижет сапог Си, россияне перестают молчать. Аббас Галлямов

Путин напирает, Лавров лижет сапог Си, россияне перестают молчать. Аббас Галлямов

Web Application Firewalls: Analysis of Detection Logic

Web Application Firewalls: Analysis of Detection Logic

BlueHat IL 2019 — Лука Тодеско (@qwertyoruiop) — Жизнь в качестве iOS-злоумышленника

BlueHat IL 2019 — Лука Тодеско (@qwertyoruiop) — Жизнь в качестве iOS-злоумышленника

Телескоп Джеймс Уэбб нашел, КУДА нас засасывает. Это НЕ Черная Дыра

Телескоп Джеймс Уэбб нашел, КУДА нас засасывает. Это НЕ Черная Дыра

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]