PCB to Payload: Cracking Embedded Systems

Training Ground | 9 February 2025



Training abstract

Join us for an exciting journey into the world of embedded security! This hands-on training is designed to teach you the fundamentals of hardware security in a simple and practical way. You’ll explore debug protocols, learn about hardware communication interfaces, and practice memory extraction techniques through real-world exercises.

Perfect for anyone with a basic understanding of electronics, this session will help you identify and analyze hardware vulnerabilities with confidence. By the end, you’ll have the skills to uncover hidden security flaws and protect embedded systems from threats.

Objective

● Understand the Basics of Hardware Security
● Master Debugging and Signal Analysis Tools
● Learn Communication Protocols, Debugging Interfaces, and Tools
● Analyze Memory and Firmware Security

List of Materials Provided

OVA Files: Pre-configured virtual machine files with all the necessary tools pre-installed for hands-on exercises.
● Hardware Kits: Includes debugging tools, communication interfaces, microcontroller boards, sensors, and necessary cabling.

Audience level:

Beginners

Student Requirements:

● Laptop with Linux OS and minimum 8GB RAM.
● Passion and willingness to learn.

Training Outline

Section Details
Introduction to Hardware Security and Electronics Fundamentals
  • Introduction: Overview of the training objectives and structure. Importance of hardware security in modern systems.
  • Electronics Safety and Fundamentals: Safety protocols for handling low-voltage devices. Overview of basic electronic components and their functions.
  • Hands-on Exercise: PCB Reverse Engineering: Identify and analyze major components on a development board using datasheets. Understand FCC IDs and their relevance. Discuss real-world examples of PCB reverse engineering.
Hardware Communication Protocols
Part I: Basics of Communication Protocols
  • Serial vs Parallel Communication: Fundamentals of data transfer methods and their use cases.
  • UART Protocol: How UART works, its parameters (baud, parity, stop/start bits), and practical applications.
  • Hands-on Exercise: UART: Write a UART transmitter from scratch. Decode UART signals using PulseView/Saleae and understand parameter configurations. Possible Attack scenarios.
Part II: Advanced Communication Protocols
  • SPI Protocol: Basics of SPI, its use cases, and typical hardware configurations.
  • Hands-on Exercise: SPI: Implement SPI communication from scratch. Debug SPI data transfers with a logic analyzer. Possible Attack scenarios.
  • I2C Protocol: Mechanics of I2C, comparison with UART and SPI, and its role in hardware security.
  • Hands-on Exercise: I2C: Write an I2C transceiver and debug with a logic analyzer. Explore methods to modify, spoof, and intercept I2C data. Possible Attack Scenarios.
Debugging and Security Concerns
  • Debug Protocols: Overview of JTAG and SWD protocols. Security implications of debug interfaces.
  • Debug Tool Demonstrations: Demonstrate common debug tools and their usage. Explore mechanisms for disabling or protecting debug access.
  • Hands-on Practice: Analyzing communication using Logic analyzer. Get access to the controller's internal memory. Debugging or changing GPIO pin values.
Memory and Firmware Security
  • Memory Overview: Types of memory and their roles in embedded systems.
  • Firmware Security: Techniques and tools for firmware analysis.
  • Case Studies: Examples of bypassing code protection and securing firmware.
  • Hands-on Exercise: EEPROM Data Extraction and Modification: Extract, analyze, and modify data from EEPROM. Understand vulnerabilities and protection mechanisms.

Season Cherian

Season Cherian is a hacker and entrepreneur with deep expertise in technical and strategic security across both private and public sectors. Leading Hardware Security Research at Traboda Cyber Labs, he specializes in OT System Security Analysis, IoT Security, and N-day research. Beyond his entrepreneurial pursuits, Season is a key organizer of the bi0s meetup, collaborating with a team to host monthly sessions that draw top cybersecurity experts and researchers, promoting cutting-edge discussions and advancements.

Additionally, he is a speaker and trainer at premier conferences such as Black Hat, SINCON, SecTor, and InCTF, delivering advanced training to leading organizations like Schneider Electric and Cisco.





Sreesankar S

Sreesankar is a hardware security researcher at Traboda CyberLabs, specializing in IoT security. Having previously led bi0sHardware, a team dedicated to hardware security. He has significantly contributed to major security events, including the NCIIPC Pentathon, the IC3 Hardware CTF, and the hardware hacking village at the Cisco Security Summit.
He actively conducts training sessions in hardware security research.