The great power of the Internet Of Things comes with the great responsibility of security". Being the hottest technology, the developments and innovations are happening at a stellar speed, but the security of IoT is yet to catch up. Since the safety and security repercussions are serious and at times life-threatening, there is no way you can afford to neglect the security of IoT products.
ARM has become a very popular architecture with the boom in IoT technology. Most of the IoT devices are driven by ARM microcontrollers/microprocessors today. Hence, it becomes very important to understand the ARM architecture and it's nuances as this knowledge is inevitable and required for reverse engineering and security evaluation of ARM-based IoT devices.
In this ARM Exploitation Workshop, we will give security professionals a comprehensive understanding of the ARM Architecture, reversing ARM binaries, exploiting vulnerabilities and the nuances of ARM shellcoding.
1. Why ARM?
2. Introduction to ARM
3. ARM Toolchain
4. Intro to Memory corruption Vulnerabilities on ARM
6. Some tips on crafting ARM Shellcode
5. Introduction to Return Oriented Programming in ARM