IoT-Architecture, Functional-Architecture, Layered model, Internet of Things Attack surface, Applied Physical Attacks-Recon and Passive Analysis, Recognizing and communicating hardware impact, Sourcing documentation and tools, Reading datasheets and inferring system functionality, Threat Modeling and System Analysis, Threat modeling when hardware is in scope, Dynamic analysis, Analyzing interconnects, Analyzing an unknown protocol, Firmware vulnerability analysis and exploitation. Static vs Dynamic analysis and tools, Dynamic analysis in-circuit vs emulator, Tooling for dynamic analysis, Reverse engineering firmware, Firmware reversing using emulation.
Programs
View all programsFrom the news
- Anti-Ragging Awareness Program 2025
- Wadi Project Achieves Milestone: Nearly 3,000 Saplings Planted in a Single Day
Others
- Amrita Hosts One-Day Workshop on Career Opportunities in Pharmaceuticals and Release of the 9th Edition of the Alumni Magazine
- Postdoctoral Fellowship in Deregulated Power Market, Smart Grid, Cyber Security, Electric Vehicles (Charging/Discharging/Infrastructure), Special Machine Designs, Novel DC-DC/AC-DC/DC-AC Converters, Micro Grid Applications @Coimbatore