Overview
This course is the first of its kind. We focus entirely on hardware hacking and techniques to defeat the security of hardware products. It's hands-on. Not only do we, as hackers, explore reverse engineering and hardware hacking processes through step-by-step experiments, we also look at defense mechanisms and technologies that we, as designers, can use to protect our products from attackers.
We'll guide you through an introduction to embedded security, explore the basic electronics fundamentals and common test equipment, and then dive into tips and techniques of successful circuit modifications and hardware hacking. The course culminates with an all-out assault by the students to break the security of a custom-designed circuit board.
A more detailed course outline may be found at the Grand Idea Studio website.
Learning Objectives:
By the time the student finishes the class, the student will have the confidence and experience to modify and tinker with electronics and hardware-based products, reverse engineer circuitry and new technologies, and evaluate the security of his own products. The student will also become familiar with the mindset of a hardware hacker, basic electronics concepts, and how to use common test measurement tools.
Although the course is more focused on hardware hacking techniques and the reverse engineering of existing products, the course will also examine many of the topics from a designer's point of view to enable him to properly incorporate security into his own hardware products and protect them from attackers.
All of the demonstrations, examples, and techniques taught in the course can be extrapolated into the student’s own product or situation.
Target Audience:
The target audience for this course is computer security consultants, design engineers, technical management, senior management, and any other individuals that are looking for a hands-on experience of hardware hacking and reverse engineering.
The course aims to educate everyone, from the beginner hobbyist or curious computer security professional with no electronics experience, to the self-proclaimed "gadget geek." Whether you like to get your hands dirty with hacking hardware or you just are curious about how hackers will reverse engineer your products, this course will be of benefit.
What to Expect:
This two-day class is a crash course in electronics, hardware hacking, and reverse engineering. The first day introduces the students to the basic concepts of hardware hacking and electronics, common hardware hacking tools, embedded security, and some hands-on techniques. The second day continues with the fundamentals of reverse engineering, more hardware hacking experiments, and a look at state-of-the-art, advanced hardware hacking techniques. The class concludes with a full-scale, hands-on hardware hacking challenge to break the security of a custom-designed circuit board performed individually or in small groups.
Students should expect to get their hands dirty with some basic electronics construction and reverse engineering exercises. The student should come into the class with an open mind and a sense of humor. Expect to leave the course with a smile on your face and a hacked circuit board around your neck.
Each student will be presented with the following materials and resources to be used and referenced throughout the course:
Following successful completion of the course, each student will leave with:
Who Should Attend
The target audience for this course is computer security consultants, design engineers, technical management, senior management, and any other individuals who are looking for a hands-on experience of hacking, reverse engineering, and analyzing hardware products.
The course aims to educate everyone, from the beginner hobbyist or curious computer security professional with no electronics experience, to the self-proclaimed "gadget geek." Whether you like to get your hands dirty with hacking hardware or you just are curious about how hackers will reverse engineer your products, this course will be of benefit.
No electronics, hardware hacking, or computer security experience is necessary. Since each individual’s knowledge and skill sets vary, we start with the basic concepts to bring everyone up to speed.
Joe Grand is an electrical engineer, prominent speaker, and prolific inventor with multiple pending patents and over a dozen commercially available products. He is the President of Grand Idea Studio, a San Francisco-based product research, development, and licensing firm, where he specializes in the design of consumer electronics and video game accessories.
Involved in computers and electronics since the age of 7, Joe has had the fortune of being a member of the legendary Boston-based hacker collective L0pht Heavy Industries, testifying before the United States Senate Governmental Affairs Committee under his nom de hack, Kingpin, and being praised as a "modern day Paul Revere" by the Senators for his research and warnings of computer security weaknesses.
Recognized for his unconventional approaches to product development and licensing, Joe is also a well-known hardware hacker, the author of two books, contributor to four others, on the technical advisory board of MAKE Magazine, and is a co-host of an upcoming engineering show for Discovery Channel.
Super Early:
Ends Mar 15 |
Early:
Ends May 1 |
Regular: |
Late: |
Onsite: |
$3000 |
$3100 |
$3300 |
$3500 |
$3800 |
Black Hat Europe 2009
April 14-17
Moevenpick City Center
Amsterdam, NL
Training April 14-15
Briefings April 16-17
Black Hat Training Europe 2009 information is online now
Please check out Black Hat Europe 2009's sponsors.
Black Hat Europe 2009 Call for Papers is closed. You can find the full list of speakers online now.
Black Hat USA 2009
July 25-30
Caesars Palace
Las Vegas, NV
Training July 25-28
Briefings July 29-30
Black Hat USA Briefings Main page is online now.
Black Hat USA 2009 Call for Papers is open now.
Find out about our 2009 venue, Caesars Palace.
Black Hat Social
Black Hat Webcasts
On the third Thursday of every month, Black Hat does a free infosec webcast. Meet security thought leaders and get your questions answered.
LinkedIn
LinkedIn members can join our Black Hat Group and post news articles of interest to the community, make connections and discuss security topics.
Facebook
We have a Facebook fan page now. Please check us out there - share your ideas, your photos, and your videos with us.
Flickr
Check out our Black Hat photostream. Comment. Contribute. Got great pix? Share with the community.
Twitter
Find out what's going on with Black Hat in real time by following us on Twitter. Meet other Black Hat speakers and attendees, share what matters to you.
Delicious
When something in the news catches our eye at Black Hat HQ, we post the link on Delicious.