| skipped 20 lines |
21 | 21 | | - Trustworthy Execution on Mobile Devices |
22 | 22 | | - https://netsec.ethz.ch/publications/papers/paper-hyperphone-TRUST-2012.pdf |
23 | 23 | | |
24 | | - | - Nick Stephens : how does someone unlock your phone with nose. (give big picture of NWd <> SWd communications and exploits) |
25 | | - | - https://fr.slideshare.net/GeekPwnKeen/nick-stephenshow-does-someone-unlock-your-phone-with-nose |
26 | 24 | | |
27 | 25 | | # TEE Exploits/Security Analysis |
28 | 26 | | |
| skipped 8 lines |
37 | 35 | | |
38 | 36 | | - Nailgun: Break the privilege isolation in ARM devices (PoC #2 only) |
39 | 37 | | - https://github.com/ningzhenyu/nailgun |
| 38 | + | |
| 39 | + | - Nick Stephens : how does someone unlock your phone with nose. (give big picture of NWd <> SWd communications and exploits) GeekPwn 2016 |
| 40 | + | - https://fr.slideshare.net/GeekPwnKeen/nick-stephenshow-does-someone-unlock-your-phone-with-nose |
40 | 41 | | |
41 | 42 | | ## Qualcomm (QSEE) |
42 | 43 | | |
| skipped 209 lines |