I can bet of all those technical holes they are intending to showcase the star is going to be the last one- "breaking Onity locks". This is some $$ generating seminar more than on security holes of embedded cores.
Hats off for finding the problems, but their method of disclosure leaves something to be desired.
If you find a vulnerability, the first thing you should do is contact the manufacturer to allow them a chance to fix the issue before the lower-tier me-too hackers use the exploits.
Hats off to the hackers, though, running pro-active quality control on embedded products.
The techniques they use are sometimes arcane but are of course exactly the same techniques that the bad guys would use. Can companies get their ordinary engineers trained in these techniques? I can't help but think that it would pay huge dividends having at least two guys who know what the real world might throw at the company's products. Might even sort out some of the department's IT issues while they are about it.
Oh but there's balance where Rick mentions 'Intel's x86 chips'. So that's OK, then.
I despair of journalists' stereotypical behaviour, lazy abuse of their privileged positions with such potential for creative enlightenment. Nearly as bad as programmers using unsafe code or engineers leaving insufficient margins in a design...
OK, I'm having a bad month, seeing things too clearly again...
The article talks about “Advanced ARM exploitation” , then goes on to say "... they will detail hardware hacks of multiple ARM platforms running Linux,[...]".
So not ARM intrinsically then? It seems that Linux has the bigger part to play in this. Trying to implicate the ARM core in this is surely mostly FUD?
A Book For All Reasons Bernard Cole1 Comment Robert Oshana's recent book "Software Engineering for Embedded Systems (Newnes/Elsevier)," written and edited with Mark Kraeling, is a 'book for all reasons.' At almost 1,200 pages, it ...