Posted on
in Presentations
Identify potential vulnerabilities and intellectual property loss due to incorrectly configured U-Boot on embedded devices. Live demos of attacker techniques to gain device access, implant backdoors and bypass security. Attendees will learn about protecting systems by hardening U-Boot, analyzing device architecture, and methods for improving security throughout a product’s lifecycle.
Learning Objectives:
1: See common misconfigurations of U-Boot.
2: Understand risks associated with improperly secured U-Boot.
3: Learn about strategies to harden embedded devices utilizing U-Boot.
Pre-Requisites:
Product development or basic hardware knowledge of embedded systems.
Learning Objectives:
1: See common misconfigurations of U-Boot.
2: Understand risks associated with improperly secured U-Boot.
3: Learn about strategies to harden embedded devices utilizing U-Boot.
Pre-Requisites:
Product development or basic hardware knowledge of embedded systems.
Share With Your Community