Useful Links
Computer Science
Cybersecurity
Embedded Systems Security and Reverse Engineering
1. Introduction to Embedded Systems Security
2. Hardware Reverse Engineering and Analysis
3. Firmware Reverse Engineering
4. Vulnerability Discovery and Exploitation
5. Secure Design and Countermeasures
Hardware Reverse Engineering and Analysis
Device Teardown and Component Identification
Non-Destructive Analysis Techniques
External Examination Methods
Casing and Enclosure Analysis
Identifying Tamper Evidence
Safe Opening Techniques
Interface and Port Identification
Visual Inspection Methods
Connector Type Identification
Pinout Discovery Techniques
Component Marking Analysis
IC Part Number Identification
Date Code Interpretation
Manufacturer Identification
Destructive Analysis Methods
IC Depackaging Techniques
Chemical Depackaging
Mechanical Depackaging
Thermal Depackaging
Die Analysis Methods
Delayering Techniques
Microscopy Analysis
Probing Techniques
Key Component Identification
Processing Units
Microcontrollers
Microprocessors
Digital Signal Processors
Application-Specific Processors
Memory Components
Flash Memory Types
RAM Variants
EEPROM Components
One-Time Programmable Memory
Communication Components
Wi-Fi Modules
Bluetooth Modules
Cellular Communication Modules
Ethernet Controllers
Power Management Components
Power Management ICs
Voltage Regulators
Battery Management Systems
Sensors and Actuators
Environmental Sensors
Motion Sensors
Actuator Controllers
Accessing Hardware Interfaces
Serial and Debug Interface Access
UART Interface Analysis
Pinout Discovery Methods
Baud Rate Detection Techniques
Protocol Analysis
Data Capture Methods
JTAG Interface Exploitation
JTAG Pinout Identification
Boundary Scan Analysis
Debug Access Methods
JTAG Security Feature Bypass
Serial Wire Debug Access
SWD Protocol Fundamentals
SWD Pinout Identification
Debug Session Establishment
Communication Bus Analysis
I2C Bus Interception
I2C Protocol Fundamentals
Bus Sniffing Techniques
Command Injection Methods
Device Enumeration
SPI Bus Analysis
SPI Protocol Basics
Signal Capture Methods
Data Injection Techniques
Chip Select Analysis
CAN Bus Security
CAN Protocol Fundamentals
Message Sniffing
Message Injection
Automotive CAN Applications
USB Interface Analysis
USB Protocol Analysis
Device Enumeration
Traffic Capture Methods
Memory and Firmware Extraction
On-board Memory Reading Techniques
In-Circuit Programming Methods
Bus Pirate Usage
Logic Analyzer Applications
Dedicated Programmer Tools
Chip-off Extraction Methods
Component Desoldering Techniques
External Programmer Usage
Socket Adaptation Methods
Debug Interface Memory Access
JTAG Memory Dumping
SWD Memory Access
Bootloader Exploitation
Firmware Interception Methods
Network-based Firmware Capture
Man-in-the-Middle Attacks
Network Traffic Analysis
Protocol Reverse Engineering
Over-the-Air Update Interception
Wireless Traffic Capture
Update Payload Extraction
Update Mechanism Analysis
Previous
1. Introduction to Embedded Systems Security
Go to top
Next
3. Firmware Reverse Engineering