Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore common firmware encryption techniques used by embedded device vendors and learn practical methods to decrypt and analyze protected firmware in this DEF CON 33 conference talk. Discover how to overcome encryption barriers that prevent security research and vulnerability discovery in embedded systems, with approaches that work both with and without specialized hardware access. Gain insights into real-world encryption implementations found in commercial devices and understand the methodologies security researchers use to bypass these protections for legitimate analysis purposes. Learn practical decryption techniques that don't require advanced cryptographic knowledge, making firmware analysis accessible to researchers at various skill levels.
Syllabus
DEF CON 33 - Firmware Decryption: For, and By, the Cryptographically Illiterate - Craig Heffner
Taught by
DEFCONConference