Exploiting and rootkitting ARM-based devices gets more and more interesting. This talk will focus on the exploitation of TEEs (Trusted Execution Environments) running in ARM TrustZone to hide a TrustZone-based-rootkit (Presented at Black Hat EU 2013).
Thomas Roth is a security researcher and consultant from Germany. His main interests are exploiting techniques, low-level and embedded reverse engineering, and cryptography implementations. He built a distributed encryption breaking framework, hacked payment terminals and implemented tools for ARM reverse engineering.