Breaking Bootloaders on the Cheap
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a comprehensive analysis of bootloader vulnerabilities in popular microcontrollers through this 25-minute Black Hat conference talk. Delve into the reverse-engineering process of three widely used microcontrollers: NXP LPC1343, ST STM32F4, and ST STM8. Discover how researchers Qais Temeiza and David Oswald assessed the possibility of overcoming readout protection using software-based attacks. Learn about the critical vulnerability found in the "Write to RAM" command of the LPC1343 bootloader and its implications for the entire chip family. Gain valuable insights into microcontroller security and potential weaknesses in bootloader implementations.
Syllabus
Breaking Bootloaders on the Cheap
Taught by
Black Hat
Related Courses
Dal Reverse engineering alla stampa 3DUniversity of Naples Federico II via Federica Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam Generative Design for Industrial Applications
Autodesk via Coursera Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam