Security
The Pitfalls and Perils of Poor Security
Hardware hacking and attacks against embedded systems are no longer limited to hobbyists who simply want to have fun making products do things they were never intended to do. Nation states, criminal organizations, and others looking to maliciously subvert, monitor, manipulate, or intentionally damage are now involved. [ continue ]
Tools of the Hardware Hacking Trade
Many electronic devices contain design flaws that could lead to exploitable vulnerabilities. In order to discover such flaws, hackers and engineers use a variety of tools. This presentation explores the tools commonly used during hardware hacking/reverse engineering, including those that monitor/decode communications, extract firmware, and identify/connect to debug interfaces. [ continue ]
Hardware Hacking for Kids
This presentation introduces kids to the joys of hardware hacking. [ continue ]
The Current State of Hardware Hacking
Hardware hacking is on the rise and most of the electronics industry is in denial. High-profile attacks against ATMs, voting machines, parking meters, medical devices, and printers were so simple, they should never have been allowed to happen in the first place. Challenges, constraints, and trade-offs are part of any product design, but it’s time security was taken a little more seriously. [ continue ]
Thinking Differently
Hackers think differently. They create new, innovative, and novel solutions to technical problems that are often deemed too difficult to solve. From Thomas Edison to Steve Wozniak to Richard Stallman, hackers have helped shape the world we live in. Corporations, on the other hand, are generally more rigid in their approaches to problem solving and are constrained by internal policies. [ continue ]