Description: Modern smartphones have a lot of secret data on them: Personal & company data, certificates for mail and credit-card data for NFC wallets. Due to this, building rootkits for them gets more and more interesting. In this talk we will use a hardware (security) feature of last generation ARM processors to write and hide rootkits in a way that they're practically invisible to the operating system.
Besides looking at the theoretical attack vector I will also talk about the lessons I learned while writing and hiding an actual rootkit using this method.
For More Information please visit : - http://www.blackhat.com/eu-13/briefings.html
Tags: securitytube , hacking , hackers , information security , convention , computer security , blackhat-eu-2013 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.