Embedded hardware is everywhere you look today from your vehicle’s infotainment system to refrigerator to medical devices and everything else in-between. With so much exposure one would think that such devices are secure against attack; however, sadly for a large number of devices this is not the case. For proof, just look no further than your local news reports. They are full of reports on devices being hacked into.
So, as engineers, how do we go about first identifying and mitigating (or capitalizing) the potential security vulnerabilities within these devices? The answer to this question, and the subject of this seminar, is through the reverse engineering of the hardware itself. This seminar is a combination of lecture and hands-on exercises which will conclude with the students attempting to attack and defeat a custom embedded device.
While the idea of taking apart a complicated piece of hardware may seem overwhelming, with both the technical background and reverse engineering techniques presented in this seminar you will soon find that you are not only up to the task but more comfortable doing so in the future. To expedite the learning process and remove some of the potential over complexities of embedded systems, the material presented in this seminar will focus on a custom made embedded device which has been designed with simplicity of understanding in mind. At the end of the seminar, students are free to take home with them the embedded device, a starter kit of physical exploitation tools, and the pre-built work environment that was used in the seminar.