Breaking Bootloaders on the Cheap
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a comprehensive analysis of bootloader vulnerabilities in popular microcontrollers through this 25-minute Black Hat conference talk. Delve into the reverse-engineering process of three widely used microcontrollers: NXP LPC1343, ST STM32F4, and ST STM8. Discover how researchers Qais Temeiza and David Oswald assessed the possibility of overcoming readout protection using software-based attacks. Learn about the critical vulnerability found in the "Write to RAM" command of the LPC1343 bootloader and its implications for the entire chip family. Gain valuable insights into microcontroller security and potential weaknesses in bootloader implementations.
Syllabus
Breaking Bootloaders on the Cheap
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network