Embedded Computer Systems
Vulnerabilities, Intrusions and Protection Mechanisms
CS 600.409
No Longer Offered

1-Credit Short Course - 10 classroom hours consisting of four lectures presented over four weeks. An expanded version of this course is also provided as a graduate-level On-line Course.

Course Description: While most of the world is pre-occupied with high profile network-based computer intrusions, this course explores a unique domain of computing that is overlooked by the news media, yet is just as vulnerable to criminal intrusions. This course examines the protection mechanisms employed today and the potential for criminal exploitation in conjunction with embedded computer systems that are found in non-networked products ranging from vending machines to automotive emission systems. This course provides a basic understanding of embedded computer systems: differences with respect to network-based computers, programmability, current intrusion protection technologies and exploitation methods. In-class computer laboratory experiments consisting of demonstration software reinforces the topic areas as discussed in the lectures.
    No longer offered by the CS Department.

Prerequisite: Basic understanding and working knowledge of computer systems.

Text: None.

Course Schedule:

Day 1 - Introduction Day 3 - Safeguarding Embedded Systems
  Case Study #1   Case Study #3
  What are Embedded Systems?   Case Study #4
  Hacking Defined    
  Threats, Vulnerabilities and Risk Assessment    
       
Day 2 - Programmability Day 4 - Embedded System Threats
  Case Study #2   Case Study #5
  Product Development Process   Closing Remarks

Don't worry, I can get another game. Part numbers and circuit layout easily read.
Enclosure protected by Tamper-Proof "headless"
screws following an attack using a power drill
Protective enclosure removed revealing exploitable
Embedded Computer System components

Return to Homepage

Photos and page design (version 2.1-09.25.03) Copyright 2003, George E. Kalb