Graduate School and Research Center in Digital Sciences

Embedded devices security and firmware reverse engineering

Zaddach, Jonas; Costin, Andrei

BLACKHAT 2013, July 31-August 1st, 2013, Las Vegas, NV, USA

Embedded devices have become the usual presence in the network of (m)any household(s), SOHO, enterprise or critical infrastructure. The preached Internet of Things promises to gazillion-uple their number and heterogeneity in the next few years. However, embedded devices are becoming lately the usual suspects in security breaches and security advisories and thus become the Achilles' heel of one's overall infrastructure security. An important aspect is that embedded devices run on what's commonly known as rmwares. To understand how to secure embedded devices, one needs to understand their  rmware and how it works. This workshop aims at presenting a quick-start at how to inspect rmwares and a hands-on presentation with exercises on real rmwares from a security analysis standpoint.

Document Bibtex

Title:Embedded devices security and firmware reverse engineering
Keywords:Compuster System Security, Network and Distributed Sys- tem Security, Embedded Devices, Firmware, Security, Re- verse Engineering
Type:Talk
Language:English
City:Las Vegas
Country:UNITED STATES
Date:
Department:Digital Security
Eurecom ref:4109
Copyright: © EURECOM. Personal use of this material is permitted. The definitive version of this paper was published in BLACKHAT 2013, July 31-August 1st, 2013, Las Vegas, NV, USA and is available at :
Bibtex: @talk{EURECOM+4109, year = {2013}, title = {{E}mbedded devices security and firmware reverse engineering}, author = {{Z}addach, {J}onas and {C}ostin, {A}ndrei }, number = {EURECOM+4109}, month = {07}, institution = {Eurecom} address = {{L}as {V}egas, {UNITED} {STATES}}, url = {http://www.eurecom.fr/publication/4109} }
See also: