Joe Grand Keynote Topics
Through the Eyes of a Hardware Hacker
Within the electronics lifecycle, there lie weaknesses that can be exploited by those looking to subvert, monitor, manipulate, or intentionally damage your product or service. While embedded security is finally a topic discussed by engineers, it is difficult to properly implement given our need to meet stringent development timeframes, budgetary constraints, and manufacturing requirements.
This presentation explores common hardware attack vectors, the importance of thinking like an adversary, and recommendations to help make systems more secure, with a caveat about why absolute security will never be guaranteed.
Tools of the Hardware Hacking Trade
Many electronic devices contain design flaws that could lead to exploitable vulnerabilities. In order to discover such flaws, hackers and engineers use a variety of tools. This presentation explores the tools commonly used during hardware hacking/reverse engineering, including those that monitor/decode communications, extract firmware, and identify/connect to debug interfaces.
Every Cloud has a Silver Lining
Security is often overlooked during the design process of electronic devices. “We’ll fix it later,” says the engineer. “It’s not worth the cost until something happens,” says the manager. Poor embedded security practices and a lack of clearly defined security goals increase the risk of a product getting hacked, whether for malicious purposes or bragging rights.
This presentation provides industry standards, best practices, and recommendations to help make systems more secure, with a caveat about why absolute security is never guaranteed.
The Pitfalls and Perls of Poor Security
Hardware hacking and attacks against embedded systems are no longer limited to hobbyists who simply want to have fun making products do things they were never intended to do. Nation states, criminal organizations, and others looking to maliciously subvert, monitor, manipulate, or intentionally damage are now involved.
Throughout the electronics lifecycle, including semiconductor fabrication, hardware and firmware design, and product manufacturing, there lie weaknesses that can be exploited. This presentation chronicles some clever hacks and scary attacks, and highlights why all of us in the electronics industry need to take responsibility and action in an attempt to make our products more secure.