Posted on
in Presentations
Identify potential vulnerabilities and intellectual property loss due to incorrectly configured U-Boot on embedded devices. Live demos of attacker techniques to gain device access, implant backdoors and bypass security. Attendees will learn about protecting systems by hardening U-Boot, analyzing device architecture, and methods for improving security throughout a product’s lifecycle.
Learning Objectives:
1: See common misconfigurations of U-Boot.
2: Understand risks associated with improperly secured U-Boot.
3: Learn about strategies to harden embedded devices utilizing U-Boot.
Pre-Requisites:
Product development or basic hardware knowledge of embedded systems.
Learning Objectives:
1: See common misconfigurations of U-Boot.
2: Understand risks associated with improperly secured U-Boot.
3: Learn about strategies to harden embedded devices utilizing U-Boot.
Pre-Requisites:
Product development or basic hardware knowledge of embedded systems.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community