Dear embedded enthusiasts! We invite you to join the upcoming Embedded Meetup Online: The buffer is too short to make it safe. A signed application is not enough - Reverse engineering of a boot loader ⬇⬇⬇
!!! This time the meeting will be held in Polish !!!
This time we will present the way from finding an exploit in the boot loader till the usage of it to remove the signature check of the firmware.
◾ How does the boot loader work?
◾ How is the firmware signature verified?
◾ How was the exploit found?
◾ Presentation of a fragment of the reverse power boot loader and more than one year of boot loader research completed with finding a critical vulnerability.
Our Speaker: Piotr Orłowski
For many years Piotr was programming primarily in C. He has always been interested in how the devices that surround us work and how the software can be reverse engineered. He checks if there are hidden options in the firmware and how to enable the additional ones. For several years Piotr has also been dealing with the topic of security in the field of embedded, both from the implementation and reverse engineering side. This combination allows him to discover what the secure embedded world looks like.
📅 DATE: October 30, 2021 (Thursday)
⏰ TIME: 5:00 - 6:15 PM
🗣 LANGUAGE: Polish
‼ Register here 👉 https://globallogic.zoom.us/webinar/register/WN_2cWE800WRi67PdCltbm9EA