Presented by
-
CEO, HandsOn Training
お客様の素早い設計とより早い製品化を実現する、技術情報と専門知識をご紹介します。
Sign in to access this content and additional site features.
Securing Embedded systems is not a trivial and a very difficult task. It requires to perform threat analysis. Be aligned with project goals (real-time, power consumption, area), have deep understanding of the device architecture and its security building blocks. Even if you are aware of the above you still have to connect the right puzzle pieces together, prepare for secure firmware update and verify your solution.
In this session, you are going to be exposed to one of the most popular attack categories, the Stack Buffer Overflow, on LPC55S69 and also how a real hacker does reverse engineering a binary file in order to conduct the attack. It's a detailed attack, which covers the theory behind it, how to find the code vulnerability, conduct the attack on the LPC, analyze the attack in memory, disassembly and reverse engineering tools. In addition, we will demonstrate how to mitigate such attacks with the LPC security features and compiler support.
Ask our Security community and get expert advice.
Subscribe to our newsletter to stay updated with our latest developments and if you need further assistance, we are here to help.
Subscribe Contact Support