Blog

No results found.
Analyzing developments in the latest version of the Movielabs’ Enhanced Content Protection Specification

Analyzing developments in the latest version of the Movielabs’ Enhanced Content Protection Specification

In this blog post will highlight some interesting developments introduced in this new version of the specification that are worth the attention of content protection professionals.
Security evaluation of a smart device: D-Link DIR 2680 router

Security evaluation of a smart device: D-Link DIR 2680 router

In this blog post, Riscure’s security analyst Naasa Fikri and senior trainer/senior security analyst Yashin Mehaboobe illustrate a common approach for a light security assessment of smart home ...
Security Highlight: The Difficulty of Securing a Mobile Phone

Security Highlight: The Difficulty of Securing a Mobile Phone

Our team did a deep dive into TEEGRIS, the newest TEE of Samsung. As a result, we proved that this TEE, introduced in 2019 for the Galaxy S10, can be fully compromised by a determined expert. ...
Failure analysis techniques applied for Side Channel Analysis

Failure analysis techniques applied for Side Channel Analysis

Riscure conducted research that proved that a specific failure analysis method, Thermal Laser Stimulation, can be effective to recover key material.
Breaking TEE Security Part 3: Escalating Privileges

Breaking TEE Security Part 3: Escalating Privileges

In our previous two blog posts, we first introduced Samsung’s TEE OS TEEGRIS and then showed how to exploit a Trusted Application (TA) and gain runtime control.
Breaking TEE Security Part 2: Exploiting Trusted Applications (TAs)

Breaking TEE Security Part 2: Exploiting Trusted Applications (TAs)

In this second blog post, we will continue to explore TEEGRIS by reverse engineering TAs in order to identify and exploit vulnerabilities.
Security Highlight: What it takes to hack a tesla and what it means for device makers

Security Highlight: What it takes to hack a tesla and what it means for device makers

KU Leuven's security research group COSIC has a strong track record in studying Tesla security and demonstrated attacks on model S in 2018 and 2019. This time, they broke model X and applied ...
Sharing knowledge through blended learning

Sharing knowledge through blended learning

You know your team needs to learn new skills. But are they actually going to be able to put new knowledge into practice? Will this investment pay off? And how does this work in a remote-first world?
Breaking TEE Security Part 1: TEEs, TrustZone and TEEGRIS

Breaking TEE Security Part 1: TEEs, TrustZone and TEEGRIS

The goal of our investigation was to assess how strong Samsung’s TEE security OS is and whether it can be compromised to obtain runtime control and extract all protected assets, allowing, e.g. ...