Despite unprecedented security incidents with such “IoT” botnets
as Mirai, there are still many devices whose security leaves much to be desired.
And with a very particular set of skills and some luck, an unsafe
device can be turned into an “attack vector” for other devices.
Sometimes it is not at all necessary to have hardcore skills in hardware
analysis and reverse engineering.
The talk is intended for a wide range of specialists
interested in firmware security. The speaker will review a modern device and explore
the use of common software tools for analyzing GNU/Linux‑based firmware
for embedded hardware