Breaking Bootloaders on the Cheap
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a comprehensive analysis of bootloader vulnerabilities in popular microcontrollers through this 25-minute Black Hat conference talk. Delve into the reverse-engineering process of three widely used microcontrollers: NXP LPC1343, ST STM32F4, and ST STM8. Discover how researchers Qais Temeiza and David Oswald assessed the possibility of overcoming readout protection using software-based attacks. Learn about the critical vulnerability found in the "Write to RAM" command of the LPC1343 bootloader and its implications for the entire chip family. Gain valuable insights into microcontroller security and potential weaknesses in bootloader implementations.
Syllabus
Breaking Bootloaders on the Cheap
Taught by
Black Hat
Related Courses
Embedded Systems - Shape The World: Microcontroller Input/OutputThe University of Texas at Austin via edX Programming for the Internet of Things Project
University of California, Irvine via Coursera Embedded Systems - Shape The World: Multi-Threaded Interfacing
The University of Texas at Austin via edX Wie programmiere ich meinen ersten Mini-Computer?
openHPI A Subjective Introduction to the IoT
ITMO University via edX