Through the Eyes of a Hardware Hacker
Within the electronics lifecycle, there lie weaknesses that can be exploited by those looking to subvert, monitor, manipulate, or intentionally damage your product or service. While embedded security is finally a topic discussed by engineers, it is difficult to properly implement given our need to meet stringent development timeframes, budgetary constraints, and manufacturing requirements.
This presentation explores the hardware hacking process, the importance of thinking like an adversary, and recommendations to help make systems more secure, with a caveat about why absolute security will never be guaranteed.
Slides: Through the Eyes of a Hardware Hacker
Revised September 1, 2021