21. Gulaschprogrammiernacht

Breaking the black-box security coprocessor in the Nintendo Switch, a story of vulnerability after vulnerability
06-09, 12:30–13:30 (Europe/Berlin), Lecture Room
Language: English

Attacking and gaining arbitrary code execution at the highest security level of the security coprocessor used on the Tegra X1

Content Notes

The talk will be about discovering vulnerabilities in a security coprocessor and exploiting them.

There is nothing in this talk with common triggers.

I do not feel comfortable taking questions on stage, but feel free to ask me after the talk, later at the event, or on Matrix (@elise:katze.sh) or any of the other places on the final slide.

I'm a security researcher with a love for the Nintendo Switch, I used to maintain a custom firmware solution until I moved on in 2019 due to toxicity. Since then I have continued researching it in my free time. I currently work as a security engineer for a medical-tech company, but I also spend the majority of my free time doing security research elsewhere. I am a cat and use She/Her pronouns. All opinions are my own and do not represent anyone I have ever worked for.