Identify potential vulnerabilities and intellectual property loss due to incorrectly configured U-Boot on embedded devices. Live demos of attacker techniques to gain device access, implant backdoors and bypass security. Attendees will learn about protecting systems by hardening U-Boot, analyzing device architecture, and methods for improving security throughout a product’s lifecycle.
1: See common misconfigurations of U-Boot.
2: Understand risks associated with improperly secured U-Boot.
3: Learn about strategies to harden embedded devices utilizing U-Boot.
Product development or basic hardware knowledge of embedded systems.
Hackers & Threats
penetration testing Internet of Things hackers & threats data security consulting & professional services
Share With Your Community