Exploring the Foundations of Mobile Trust

  • Tuesday, March 1, 2016 | 1:10 PM – 2:00 PM | West | Room: 3018

View all Sessions

From the perspective of trusted computing and hardware integrity, there are a handful of smartphone hardware platforms on the market. OEMs are constrained to release devices based on trusting one of these platforms. If a skilled attacker can break trust at the hardware level, the entire device becomes compromised at a very basic (and largely undetectable) level. Let’s talk about how to break that trust.


This document was retrieved from on Sat, 16 Dec 2017 06:05:14 -0500.
© 2017 EMC Corporation. All rights reserved.