Security Highlight: The Difficulty of Securing a Mobile Phone
14 Apr, 21 | Security Highlight
Our team did a deep dive into TEEGRIS, the newest TEE of Samsung. As a result, we proved that this TEE, introduced in 2019 for the Galaxy S10, can be fully compromised by a determined expert. ...
Breaking TEE Security Part 3: Escalating Privileges
30 Mar, 21 | Device Evaluation
In our previous two blog posts, we first introduced Samsung’s TEE OS TEEGRIS and then showed how to exploit a Trusted Application (TA) and gain runtime control.
Security Highlight: What it takes to hack a tesla and what it means for device makers
09 Mar, 21 | Security Highlight
KU Leuven's security research group COSIC has a strong track record in studying Tesla security and demonstrated attacks on model S in 2018 and 2019. This time, they broke model X and applied ...
You know your team needs to learn new skills. But are they actually going to be able to put new knowledge into practice? Will this investment pay off? And how does this work in a remote-first world?
Breaking TEE Security Part 1: TEEs, TrustZone and TEEGRIS
23 Feb, 21 | Device Evaluation
The goal of our investigation was to assess how strong Samsung’s TEE security OS is and whether it can be compromised to obtain runtime control and extract all protected assets, allowing, e.g. ...
At the end of last year, ForeScout analyzed seven open-source software libraries and found a set of 33 vulnerabilities in four of them (uip, picoTCP, FNET, Nut/Net). Three of these ...