This course covers the exploitation of Teridian System-on-a-Chip (SoC) devices with a focus on Harvard architecture smart grid systems. The learning outcomes include understanding the architecture and system overview of Teridian 8051 based chips, exploring exploitation scenarios, and gaining insights into attacking Harvard architecture systems and code security implementations. The course teaches skills such as gaining code execution, leveraging STM, and utilizing the Goodfet approach. The teaching method involves a talk that covers architecture and system overviews, followed by in-depth exploration of exploitation techniques. The intended audience for this course includes cybersecurity professionals, embedded systems engineers, and individuals interested in hardware security and smart grid systems.
Overview
Syllabus
Intro
echo $AGENDA
MPU & CE
Flash Memory
ICE, baby
Interfaces to the world
FCTRL[6] //SECURE
Gaining code exec
Leveraging STM
Execution via STM
Constraints
The Goodfet approach
Taught by
Black Hat