Could that be relevant for other implementation, like say the "AMD Secure Processor (formerly “Platform Security Processor” or “PSP”) [...] a dedicated processor that features ARM TrustZone® technology"?
-
-
-
The ECDSA attack is unlikely to apply, unless the AMD PSP uses Qualcomm's implementation. However, the powerful side-channel attacks may apply to any TrustZone implementation. It doesn't mean all TZ is insecure, but it demonstrates what sort of TZ code is practically exploitable.
Kraj razgovora
Novi razgovor -
-
-
congrats Keegan! nice to see your sidechannel progress
-
Thank you!
Kraj razgovora
Novi razgovor -
-
-
This is incredibly cool research.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Great work
cc @cybergibbons@hardwear_io@adhorden Excellent paper on breaking the security of Qualcomm’s hardware-backed keystore. Incredible that Qualcomm's 35 chipsets are affected by this vulnerability. -
This is amazing work
. I need more time to read it in detail and divulge but ideal paper to read on my lunch breach shortly
.
Kraj razgovora
Novi razgovor -
-
-
Good read, cool! :-) Also: that took pretty long before disclosure.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Really, a nice one! Much appreciated. I can recommend reading the mentioned paper.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

Into embedded systems, cryptography, and side channel attacks.
Pic edited from stream of my 34c3 talk (CC BY 3.0 DE)