About This Training
Securing Embedded systems is not a trivial and a very difficult task. It requires to perform threat analysis. Be aligned with project goals (real-time, power consumption, area), have deep understanding of the device architecture and its security building blocks. Even if you are aware of the above you still have to connect the right puzzle pieces together, prepare for secure firmware update and verify your solution.
In this session, you are going to be exposed to one of the most popular attack categories, the Stack Buffer Overflow, on LPC55S69 and also how a real hacker does reverse engineering a binary file in order to conduct the attack. It's a detailed attack, which covers the theory behind it, how to find the code vulnerability, conduct the attack on the LPC, analyze the attack in memory, disassembly and reverse engineering tools.
In addition, we will demonstrate how to mitigate such attacks with the LPC security features and compiler support.