Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of bootloader vulnerabilities in popular microcontrollers through this 25-minute Black Hat conference talk. Delve into the reverse-engineering process of three widely used microcontrollers: NXP LPC1343, ST STM32F4, and ST STM8. Discover how researchers Qais Temeiza and David Oswald assessed the possibility of overcoming readout protection using software-based attacks. Learn about the critical vulnerability found in the "Write to RAM" command of the LPC1343 bootloader and its implications for the entire chip family. Gain valuable insights into microcontroller security and potential weaknesses in bootloader implementations.