Embedded Computer Systems
Vulnerabilities, Intrusions and Protection Mechanisms

on-line course
CS 695.411 - (formerly 605.433) offered through JHU Engineering for Professionals (EP)

CS 650.433 - offered through JHUISI Homewood

Course Description: While most of the world is pre-occupied with high profile network-based computer intrusions, this course explores a unique domain of computing that is overlooked by the news media, yet is just as vulnerable to criminal intrusions. This course examines the protection mechanisms employed today and the potential for criminal exploitation in conjunction with embedded computer systems that are found in non-networked products ranging from vending machines to automotive emission systems. This course provides a basic understanding of embedded computer systems: differences with respect to network-based computers, programmability, current intrusion protection technologies and exploitation methods along with material relating to computer hacking and vulnerability assessment. The course materials consists of a set of eight Study Modules and eight Case Study experiments (to be completed at a rate of about one per week) and are augmented by on-line Discussion Areas moderated by the instructor.
    A more detailed course syllabus that includes Objectives, Schedule, Course Description, Grading Policy and Recommended Computing Environment can be found here.

Prerequisite: Basic understanding and working knowledge of computer systems and access to Intel-based PC hosting a Microsoft Windows environment. Review current course catalog as 695.401 "Foundations in Information Assurance" and (potnetialy) 695.421 "Foundations of Algorithms" are likely to apply as prerequisites.

Text: None

Course Schedule:

Week 1 Introduction, Case Study #1
Week 2 What are Embedded Systems?
Week 3 Hacking Defined
Week 4 Threats, Vulnerabilities and Risk Assessment
Week 5 Programmability
Week 6 Case Study #2
Week 7 Product Development Process
Week 8 Mid-Term Exam
Week 7 Safeguarding Embedded Systems (part 1)
Week 10 Case Study #3 & #4
Week 11 Case Study #5 & #6
Week 12 Safeguarding Embedded Systems (part 2)
Week 13 Case Study #7 & #8
Week 14 Embedded System Software Threats
Week 15 Final Exam

Don't worry, I can get another game. Let's see, those 1's and 0's are in here somewhere!
Enclosure protected by Tamper-Proof "headless"
screws following an attack using a power drill
Circuit boards (2 games) and components exposed
and ready for electronic exploitation

Return to Homepage | Engineering for Professionals (EP) Homepage | JHUISI Course Offerings

Photos and page design (version 2.36-06.25.11) Copyright 2011, George E. Kalb