Various protection features and constraints in a system make acquiring and reversing firmware a daunting task. The speakers will present a methodology that can efficiently reverse-engineer firmware, especially with the help of low-level hardware reversing techniques, such as IC chips. They will introduce ongoing plans and achievements, including newly designed SW/HW reversing techniques and toolkits.
Pre-Requisites: Basic understanding of computer architecture and reverse engineering techniques.
Security Strategy & Architecture Protecting Data & the Supply Chain Ecosystem Hackers & Threats
supply chain security architecture hackers & threats exploit of vulnerability
Share With Your Community