Course Description: While most of the world
is pre-occupied with high profile network-based computer
intrusions, this course explores a unique domain of computing
that is overlooked by the news media, yet is just as vulnerable
to criminal intrusions. This course examines the protection
mechanisms employed today and the potential for criminal
exploitation in conjunction with embedded computer systems that
are found in non-networked products ranging from vending machines
to automotive emission systems. This course provides a basic
understanding of embedded computer systems: differences with
respect to network-based computers, programmability, current
intrusion protection technologies and exploitation methods
along with material relating to computer hacking and
vulnerability assessment. The course materials consists of
a set of eight Study Modules and eight Case Study experiments
(to be completed at a rate of about one per week) and are augmented
by on-line Discussion Areas moderated by the instructor.
A more detailed course syllabus that
includes Objectives, Schedule, Course Description, Grading Policy
and Recommended Computing Environment can be found
here.
Prerequisite: Basic understanding and working
knowledge of computer systems and access to Intel-based PC hosting
a Microsoft Windows environment.
Text: None |
Course Schedule:
Week 1 | Introduction, Case Study #1 |
Week 2 | What are Embedded Systems? |
Week 3 | Hacking Defined |
Week 4 | Threats, Vulnerabilities and Risk Assessment |
Week 5 | Programmability |
Week 6 | Case Study #2 |
Week 7 | Product Development Process |
Week 8 | Mid-Term Exam |
Week 7 | Safeguarding Embedded Systems (part 1) |
Week 10 | Case Study #3 & #4 |
Week 11 | Case Study #5 & #6 |
Week 12 | Safeguarding Embedded Systems (part 2) |
Week 13 | Case Study #7 & #8 |
Week 14 | Embedded System Software Threats |
Week 15 | Final Exam |
Enclosure protected by Tamper-Proof
"headless" screws following an attack using a power drill |
Circuit boards (2 games) and components exposed and ready for electronic exploitation |
Return to Homepage | Part-Time Engineering Homepage | JHUISI Course Offerings
Photos and page design (version 2.4-08.31.05) Copyright 2005, George E. Kalb