Practical block course on firmware security. Embedded devices are widely used in our daily life and there will be many more in the future. However, it is quite easy to manipulate these devices in many cases causing major threats for users and the entire Internet. E.g.: The Mirai Botnet infected millions of home routers and other devices. It used these devices to launch the biggest DDoS attack ever measured (until than) against a popular security blog. The firmware security bootcamp teaches the analysis and exploitation of firmware.
The Firmware Security Bootcamp is a block course during the lecture-free period in March/April. It is held at our cooperation partner Fraunhofer FKIE in Bonn-Bad Godesberg. Presence in Bonn is required for five full days for the crash course, 3 half days for lightning talks (TBA, likely the three Fridays following the crash course), and one (half) day for the graded final presentations (TBA, April or May 2020). The topics offered will mostly be supervised by staff members of Fraunhofer FKIE. The Firmware Security Bootcamp consists of three phases:
FACT is an open source project intended to automate and simplify firmware analysis such that much more researchers can contribute to a higher security standard for embedded devices. It is part of Fraunhofer FKIE's research efforts and an actively maintained project.
Skills in Python 3 and basic knowledge of the Linux command line are mandatory.
See above.