KU Leuven (Bélgica)
Threats and Security for Embedded Devices
This session discussed the attack surface of the embedded device ecosystem and reviews common security pitfalls. We do this by looking at real world examples and by demonstrating easy to use techniques.
The threat model of embedded devices is significantly different than that of other information systems. Additionally, embedded devices are often harder to access and thus seem much harder to test.
In this session, we take a practical approach to investigating the security of embedded devices. We analyze how the differences in threat models affect the approach to security. Additionally, we look under the hood of some embedded Linux devices and demonstrate multiple techniques anyone can use to analyze them. As a result, we will uncover and discuss a few common security issues.