Link to this headingTrustZone
- Exploiting Samsung TEE
- Reverse Engineering the Samsung S6 Trustzone
- Reverse Engineering the Samsung S6 Trustzone Part2
- Unbox Your Phone — Part I
- Unbox Your Phone — Part I
- Unbox Your Phone — Part I
- Project Zero Trust Issues: Exploiting TrustZone TEEs
- More Project Zero TrustZone
- Exploring Qualcomm’s TrustZone implementation
Link to this headingKeystore
How the Keystore works
Android Security: The Forgetful Keystore
On Android 6+ (API XX) if the device supports it The Master key is stored in the Trusted Execution Environment (TEE).
These are stored in [USERID]_[KEYTYPE]_[KEYNAME].
Key Types
- USRPKEY: User Private Key
- USRSKEY: User Shared Key
- CACERT: CA Certificate
Encrypted Keystore Files:
How to Decrypt Keystore Files:
#Currently Gives ListKeys failed.
#Currently Gives Error 6 Permission Denied
An Open Framework for Architecting Trusted Execution Environments
Android Keystore info
How Secure is your Android Keystore Authentication?
Link to this headingFingerprint
Setting a Key with setUserAuthenticaitonRequired(true) prevents it from being retrieved without authenticating with a Fingerprint.