1-Credit Short Course - 10 classroom hours consisting of four lectures presented over four weeks. An expanded version of this course is also provided as a graduate-level On-line Course.
Course Description: While most of the world
is pre-occupied with high profile network-based computer
intrusions, this course explores a unique domain of computing
that is overlooked by the news media, yet is just as vulnerable
to criminal intrusions. This course examines the protection
mechanisms employed today and the potential for criminal
exploitation in conjunction with embedded computer systems that
are found in non-networked products ranging from vending machines
to automotive emission systems. This course provides a basic
understanding of embedded computer systems: differences with
respect to network-based computers, programmability, current
intrusion protection technologies and exploitation methods.
In-class computer laboratory experiments consisting of demonstration
software reinforces the topic areas as discussed in the
lectures.
No longer offered
by the CS Department.
Prerequisite: Basic understanding and working
knowledge of computer systems.
Text: None.
Course Schedule:
Day 1 - | Introduction | Day 3 - | Safeguarding Embedded Systems |
Case Study #1 | Case Study #3 | ||
What are Embedded Systems? | Case Study #4 | ||
Hacking Defined | |||
Threats, Vulnerabilities and Risk Assessment | |||
Day 2 - | Programmability | Day 4 - | Embedded System Threats |
Case Study #2 | Case Study #5 | ||
Product Development Process | Closing Remarks |
Enclosure protected by Tamper-Proof
"headless" screws following an attack using a power drill |
Protective enclosure removed revealing exploitable Embedded Computer System components |
Photos and page design (version 2.1-09.25.03) Copyright 2003, George E. Kalb