Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

How and Why Do the Bad Guys Attack Embedded Products?

Linux Foundation via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the unique security challenges facing embedded devices in this 38-minute conference talk from the Linux Foundation's Open Source Summit. Discover how attackers target embedded products differently from traditional IT systems, focusing on the physical accessibility that creates distinct vulnerabilities. Learn about the attacker's mindset through real-world examples from recent years, examining how malicious actors identify and exploit physical interfaces, software stacks, and organizational weaknesses. Understand the process of mapping attack surfaces for your own products and develop comprehensive threat models to identify potential security gaps. Gain practical recommendations to avoid common security pitfalls in embedded device development, while reflecting on the evolution of embedded security practices since 2009. Master the fundamentals of embedded security from an adversarial perspective to better protect your products against physical and digital threats.

Syllabus

How and Why Do the Bad Guys Attack Embedded Products? - Marta Rybczynska, Ygreky

Taught by

Linux Foundation

Reviews

Start your review of How and Why Do the Bad Guys Attack Embedded Products?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.