SecAppDev 2020 Lecture Details
Security of embedded devices - an introduction
Friday March 13, 09:00 - 10:30
This session introduces the main components of the embedded device ecosystem and some of the common security pitfalls. We do this by looking at real world examples and by demonstrating easy to use techniques.
The threat model of embedded devices is significantly different than that of other information systems. Additionally, embedded devices are often harder to access and thus seem much harder to test.
In this introductory session, we take a practical approach to investigating the security of embedded devices. We analyze how the differences in threat models affect the approach to security. Additionally, we look under the hood of some embedded Linux devices and demonstrate multiple techniques anyone can use to analyze them. As a result, we will uncover and discuss a few common security issues.
Gain a basic understanding of the inner workings of an embedded device and how to asses its security.
Anyone building, designing or securing low-level and embedded software.
PhD researcher, COSIC, KU Leuven
Lennert Wouters obtained a Master in Engineering Technology and an Advanced Master in Artificial Intelligence from the University of Leuven. After completing his studies, Lennert joined the Computer Security and Industrial Cryptography (COSIC) research group, an imec research group at KU Leuven. As a PhD researcher his research interests include hardware security of connected embedded devices, reverse engineering and side channel attacks.
Related low-level security sessions
Hands-on introduction to Rust
Haven't done any Rust? Want to know what makes Rust so special? Want the ability to ask two highly experienced Rust developers nuanced questions? Join us as we go hands-on with Rust, starting from an empty file and learning about the Rust ecosystem, pervasive and unique-to-Rust concepts, and areas where Rust truly shines.
Low-level security Thursday March 12, 09:00 - 17:30
Trusted Execution and how far you can trust it
Lecture by Jan Tobias Muehlberg
Modern processors provide Trusted Execution Environments that allow you to protect software components even from an untrusted operating system. Learn when and how to use them!
Low-level security Wednesday March 11, 09:00 - 10:30