YoVDO

Reversing and Exploiting Embedded Devices - Walking the Software and Hardware Stack

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Embedded Systems Courses Reverse Engineering Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of reversing and exploiting embedded devices in this 49-minute conference talk from GrrCon 2016. Walk through both the software and hardware stack as Elvis Collado demonstrates techniques for analyzing and manipulating embedded systems. Gain insights into the vulnerabilities and potential attack vectors present in these devices, and learn practical approaches for reverse engineering their components. Delve into the world of embedded security and discover how to identify and exploit weaknesses in these increasingly ubiquitous technologies.

Syllabus

204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube