Browse Learn C1524

Design Considerations for Secure Embedded Systems C1524

Embedded hardware is everywhere you look today from your vehicle’s infotainment system to refrigerator to medical devices and everything else in-between. With so much exposure one would think that such devices are secure against attack; however, sadly for many devices this is not the case. For proof, just look no further than your local news reports. They are full of reports on devices being hacked.

So, as engineers, how do we go about first identifying and mitigating (or capitalizing) the potential security vulnerabilities within these devices? The answer to this question, and the subject of this seminar, is through the reverse engineering of the hardware itself. This seminar is a combination of lecture and hands-on exercises which will conclude with the students attempting to reverse engineer both a vulnerable and a secured embedded device.

While the idea of taking apart a complicated piece of hardware may seem overwhelming, with both the technical background and reverse engineering techniques presented in this seminar you will soon find that you are not only up to the task but more comfortable doing so in the future. To expedite the learning process and remove some of the potential over complexities of embedded systems, the material presented in this seminar will focus on a widely-available Arduino-based development board, which has been designed with simplicity of understanding in mind. At the end of the seminar, students are free to take home with them the development board, a starter kit of physical exploitation tools, and the pre-built work environment that was used in the seminar.

Learning Objectives
By attending this seminar, you will be able to:
  • Identify key hardware components of embedded systems
  • Research and use datasheets
  • Interpret basic schematics
  • Locate and utilize hidden communication paths (i.e. debug ports)
  • Interface target hardware with a PC
  • Extract and analyze firmware from an embedded system

Who Should Attend
This seminar is intended for engineers who want to develop a basic understanding and the corresponding skill set needed for the hardware reverse engineering of embedded systems. The seminar assumes students have at least a basic understanding of both electronics and programming. Other prospective students who will benefit from this course include computer security researchers, digital forensic investigators, software engineers, and senior management.


  • Overview of Embedded Systems
    • Definitions
    • Examples
    • Purpose of Reverse Engineering
    • Legal Considerations
    • Ethical Considerations
    • Reverse Engineering Mindset
  • Basic Electronic Concepts
    • Electrical Component Symbols
    • Datasheets
    • Schematics
    • Continuity Checks with Multimeters
    • Resistance Calculations
  • Equipping Your Work Environment
    • Reverse Engineering Tools
  • Key Components in Embedded Systems


  • Review of Day One Material
  • Embedded Systems Communication Protocols
    • Embedded Systems Communications Protocols
    • Universal Asynchronous Receiver/Transmitter (UART)
    • Serial Peripheral Interface (SPI)
    • Joint Test Action Group (JTAG)
    • Inter-Integrated Circuit (I2C)
    • CAN Bus
  • Embedded Systems Reverse Engineering Process
    • Reconnaissance
    • Identification of Pins and Components
    • Finding Datasheets
    • Plan Formulation
    • Attack Vector Identification
    • Firmware Mod Kit
  • The Mission Debrief
  • Section Two Summary
  • Closing Discussion
Glen Roberts

Glen Roberts is a Project Manager for the Systems Analysis and Exploitation group at Assured Information Security, Inc. (AIS), specializing in penetration testing, reverse engineering, embedded systems security and exploitation, drone security and professional cybersecurity education.

Prior to joining AIS, Roberts spent more than sixteen years in law enforcement working in New Jersey. During his career in law enforcement, he earned his bachelor's degree and master's degree in Cybersecurity (Computer Forensics and Cyber Operations) from Utica College, where he currently teaches graduate and undergraduate cybersecurity courses. He also earned the following certifications: CISSP (ISC2); OSCE (Offensive Security); OSCP (Offensive Security); and Security (Comp-TIA).


Hotel & Travel Information

Fees: $1595.00
SAE Members: $1436.00 - $1436.00

1.3 CEUs
You must complete all course contact hours and successfully pass the learning assessment to obtain CEUs.

If paying by a credit card, click the Register button above. If paying by any other method or for general inquiries, please contact SAE Customer Service 1-877-606-7323 (724-776-4970 outside the U.S. and Canada) or at

Duration: 2 Days
August 5-6, 2020 (8:30 a.m. - 4:30 p.m.) - Troy, Michigan

Corporate Learning Solutions

Private training your team needs – delivered to your location.

Request Information »