YoVDO

Reversing and Exploiting Embedded Devices - Walking the Software and Hardware Stack

Offered By: YouTube

Tags

Conference Talks Courses Assembly Language Courses IoT security Courses Binary Analysis Courses JTAG Courses Firmware Analysis Courses Embedded Device Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore embedded device security through a comprehensive conference talk on reversing and exploiting techniques. Delve into the software and hardware stack, covering topics such as binary analysis, firmware examination, debugging, assembly language, hardware exploration, and JTAG interfacing. Learn about FCC ID research, internal photo analysis, and crash analysis techniques. Compare MIPS, ARM, and x86 architectures, and gain hands-on experience with OpenOCD for debugging. Discover practical approaches to IoT security, including fuzzing methodologies and exploitation strategies, presented by Elvis Collado at GrrCon 2016.

Syllabus

Intro
Who am I
I love CTs
How I got into IoT
I fuzzed everything
Looking at the binary
Looking at the firmware
Getting into Exploiting
Debugging
Learning Assembly
Hardware
FCC ID
Internal Photos
Find Ground
CSI Enhance
JTAG
OpenOct
Crash Analysis
Ill Stop Bitching
RAZAM
DVRF
pox
Faraday cage
Demo time
MIPS vs x86
ARM vs x86
JTAG Ulor
OpenOCD
OpenOCD Interface
Conclusion
Debugger
Console
PS2 Midspaced
Quick Probe
Slides


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube