Exploring the Foundations of Mobile Trust

  • Tuesday, March 1, 2016 | 1:10 PM – 2:00 PM | West | Room: 3018

View all Sessions

From the perspective of trusted computing and hardware integrity, there are a handful of smartphone hardware platforms on the market. OEMs are constrained to release devices based on trusting one of these platforms. If a skilled attacker can break trust at the hardware level, the entire device becomes compromised at a very basic (and largely undetectable) level. Let’s talk about how to break that trust.


This document was retrieved from on Wed, 14 Nov 2018 10:22:53 -0500.