Tutorial: Introduction to Reverse Engineering – Mike Anderson, The PTR Group, Inc.
Tutorial: Introduction to Reverse Engineering – Mike Anderson, The PTR Group, Inc.
Security is always a concern as our products ship, especially in today’s world of cracking attempts. But, what enables the crackers to be able to break into systems? Oftentimes, the answer is that they reverse engineer your product. In this tutorial, we will examine the techniques used by the cracker to reverse engineer your hardware and your software. We will look at techniques to bypass physical security as well as repopulating connectors on motherboards, reading flash storage, accessing firmware updates and the software techniques used to find vulnerabilities in your code.
About Mike Anderson
Mike Anderson is currently Chief Scientist for The PTR Group, Inc. With over 40 years in the embedded and real-time computing industry, Mike works with a number of RTOS offerings for IoT devices. However, his focus over the past decade is primarily embedded Linux on a number of CPU architectures. As an instructor and consultant, Mike is a regular speaker at the Embedded Linux Conference, OpenIoT Summit and the Embedded Systems Conference as well as other Linux and IoT-oriented conferences. Ongoing projects include several efforts focused on migrating applications from RTOS offerings to real-time enhanced Linux platforms. Additional projects include work with mesh wireless topologies, 6LoWPAN, commercial reverse engineering and multiple robotics projects in working with the FIRST Robotics Program in the high schools.
by The Linux Foundation
linux foundation