06-09, 12:30–13:30 (Europe/Berlin), Lecture Room
Attacking and gaining arbitrary code execution at the highest security level of the security coprocessor used on the Tegra X1
The talk will be about discovering vulnerabilities in a security coprocessor and exploiting them.
There is nothing in this talk with common triggers.
I do not feel comfortable taking questions on stage, but feel free to ask me after the talk, later at the event, or on Matrix (@elise:katze.sh) or any of the other places on the final slide.
I'm a security researcher with a love for the Nintendo Switch, I used to maintain a custom firmware solution until I moved on in 2019 due to toxicity. Since then I have continued researching it in my free time. I currently work as a security engineer for a medical-tech company, but I also spend the majority of my free time doing security research elsewhere. I am a cat and use She/Her pronouns. All opinions are my own and do not represent anyone I have ever worked for.