Exploring the Foundations of Mobile Trust

  • Tuesday, March 1, 2016 | 1:10 PM – 2:00 PM | West | Room: 3018

View all Sessions

From the perspective of trusted computing and hardware integrity, there are a handful of smartphone hardware platforms on the market. OEMs are constrained to release devices based on trusting one of these platforms. If a skilled attacker can break trust at the hardware level, the entire device becomes compromised at a very basic (and largely undetectable) level. Let’s talk about how to break that trust.


This document was retrieved from on Sun, 19 May 2019 12:34:12 -0400.