HITB-Invoice-Logo

deep knowledge technical trainings

AUGUST 22 / 23 / 24 / 25 @ INTERCONTINENTAL SINGAPORE

TEEPwn: Breaking TEEs by Experience

The TEEPwn experience provides an offensive system-level perspective and dives into the darker corners of TEE Security. It is designed with a system-level approach, where you will experience powerful exploitation of TEE vulnerabilities. The TEEPwn experience is hands-on, gamified and driven by an exciting jeopardy-style Capture the Flag (CTF).

$4,299.00

Duration

4-day

Delivery Method

In-Person

Level

intermediate

Seats Available

20

 


This 4-day TEEPwn course is one of two Raelize’s Pwn training courses. The other is BOOTPwn which is being held in Amsterdam this May. To find out more about this May’s 4-day BOOTPwn course, click here.

REGISTRATION CLOSED

DATE: 22-25 August 2022

TIME: 09:00 to 17:00 SGT/GMT +8

Date Day Time Duration
22 Aug Monday 0900-17:00 SGT/GMT +8 8 Hours โ€“ Presentations & Hands-on exercises
23 Aug Tuesday 0900-17:00 SGT/GMT +8 8 Hours โ€“ Presentations & Hands-on exercises
24 Aug Wednesday 0900-17:00 SGT/GMT +8 8 Hours โ€“ Presentations & Hands-on exercises
25 Aug Thursday 0900-17:00 SGT/GMT +8 8 Hours โ€“ Presentations & Hands-on exercises

It’s notoriously hard to secure a Trusted Execution Environment (TEE) due to the interaction between complex hardware and a large trusted code base (TCB). The security provided by TEEs has been broken on a wide variety of devices, including mobile phones, smart TVs and even vehicles. Publicly disclosed TEE vulnerabilities were often exploited directly from the less-trusted Rich Execution Environment (REE). Many of these vulnerabilities were speandcific for TEEs and required novel exploitation techniques.

The TEEPwn experience provides an offensive system-level perspective and dives into the darker corners of TEE Security. It is designed with a system-level approach, where you will experience powerful exploitation of TEE vulnerabilities. The TEEPwn experience is hands-on, gamified and driven by an exciting jeopardy-style Capture the Flag (CTF).

Your journey starts by achieving a comprehensive understanding of TEEs, where you will learn how hardware and software concur to enforce effective security boundaries. You will then use this understanding for identifying interesting vulnerabilities across the entire TEE attack surface. You will then be challenged along the path to exploit them in multiple scenarios. All vulnerabilities are identified and exploited on our emulated attack platform which implements an ARMv8 (64-bit) TEE based on ARM TrustZone.

You will take on different roles, as an attacker in control of:

  • the REE, attempting to achieve privileged code execution in the TEE.
  • the REE, trying to access assess protected by a Trusted Application (TA).
  • a TA, aiming to escalate privileges to TEE OS.
  • a TA, accessing the protected assets of other TAs.

TEEPwn will guide you into an unexpected range of attack vectors and TEE-specific exploitation techniques, which may be leveraged for novel and creative software exploits. refining your skills to a new level.

 

Deliverables

During the training we will provide you with the following:

  • cloud-based virtual machine with all the required tooling installed
  • access to the exercise modules and instructions
  • walk through videos for the hands-on exercises

We will also provide you the following in order to continue with the exercises after the training:

  • offline virtual machine with all tooling preinstalled
  • ability to copy the exercise modules and instructions
  • ability to run the exercise modules forever

 

Format

This TEEPwn experience will be given in a hybrid format where attendees are able to join in-person and online at the same time. Attendees need to select the desired format before the start of the training.

  • Option1: The in-person format requires attendees to join us on-site in Singapore for 4 days full of lectures and practical exercises. The lectures and support are provided in-person using a classroom setting.
  • Option 2: The online format requires attendees to join us online for 4 days full of lectures and practical exercises. The lectures from the in-person classroom are virtually streamed using Zoom. Support is provided virtually via Discord.

 

Topics Covered

  • TEE Fundamentals
    • TEE overview
    • Security model
  • ARM TrustZone-based TEEs
    • TEE SW components
    • TEE attacker model
    • TEE attack surface
  • REE โ€“> TEE attacks
    • Secure Monitor
    • TEE OS (SMC interface)
    • Exploitation:
      • Vulnerable SMC handlers
      • Broken design
      • Unchecked Pointers
      • Restricted writes
      • Range checks
  • REE โ€“> TA attacks
    • Communicating with TAs
    • Global Platform APIs
    • Exploitation:
      • Type confusion
      • TOCTOU (Double fetch)
  • TA โ€“> TEE attacks
    • TEE OS (Syscall interface)
    • Drivers
    • Exploitation:
      • Unchecked pointers from TA
      • Vulnerable crypto primitives
  • TA โ€“> TA attacks
    • State confusion

ย 

 


This 4-day TEEPwn course is one of two Raelize’s Pwn training courses. The other is BOOTPwn which is being held in Amsterdam this May. To find out more about this May’s 4-day BOOTPwn course, click here.

ย 

Researcher

National University Singapore

Dr. Wang Kailong is currently a research fellow at National University of Singapore (NUS). He received his PhD degree from School of Computing NUS in 2022. He has worked as a Research Assistant in NUS while pursuing his PhD degree from 2016 to 2021. His research interests include mobile and web security and privacy, and protocol verification. His works have appeared in the top conferences such as WWW and MobiCom.

Co-Founder & CTO

Authomize

Mr. Gal Diskin is a cybersecurity and AI researcher. He was previously the VP & head of Palo Alto Networks’ Israeli site, and is a serial entrepreneur. Mr. Diskin’s research has been featured in HITB, Defcon, Black Hat, CCC, and other conferences, spanning fields from low level security research such as hardware vulnerabilities, binary instrumentation, and car hacking to high level research on AI detection methods, Enterprise security, and Identity security. Mr. Diskin was also the technical lead and co-founder of Intel’s software security organization, as well as the CTO of Cyvera and HeXponent (co-founder) before their acquisition.

Senior Security Researcher

Huajiang โ€œKevin2600โ€ Chen (Twitter: @kevin2600) is a senior security researcher. He mainly focuses on vulnerability research in wireless and Vehicle security. He is a winner of GeekPwn 2020 and also made to the Tesla hall of fame 2021. Kevin2600 has spoken at various conferences including KCON; DEFCON and CANSECWEST.

Why You Should Take This Course

The TEEPwn experience provides an offensive system-level perspective and dives into the darker corners of TEE Security. It is designed with a system-level approach, where you will experience powerful exploitation of TEE vulnerabilities. The TEEPwn experience is hands-on, gamified and driven by an exciting jeopardy-style Capture the Flag (CTF).

Who Should Attend

  • Security Analysts and Researchers, interested in new techniques.
  • Software Security Developers/Architects interested in TEE software attack techniques.

Key Learning Objectives

[“Explore TEE security at the system level”,”Gain strong understanding of TrustZone-based TEEs”,”Identify vulnerabilities across the entire TEE attack surface”,”Experience TEE-specific exploitation techniques”]

Prerequisite Knowledge

  • Experience with C/C++ programming
  • Experience with the ARM architecture (AArch64)
  • Understanding of typical software vulnerabilities
  • Familiarity with reverse engineering and typical exploitation techniques
  • Familiarity with modern OS security concepts

Hardware / Software Requirements

1. Stable Internet connection with sufficient bandwidth

2. Any modern computer system or laptop:

  • With sufficient memory (~8 GB)
  • With sufficient disk space (~50 GB)
  • Installed with a recent version of VMware (or similar)