IoT-Architecture, Functional-Architecture, Layered model, Internet of Things Attack surface, Applied Physical Attacks-Recon and Passive Analysis, Recognizing and communicating hardware impact, Sourcing documentation and tools, Reading datasheets and inferring system functionality, Threat Modeling and System Analysis, Threat modeling when hardware is in scope, Dynamic analysis, Analyzing interconnects, Analyzing an unknown protocol, Firmware vulnerability analysis and exploitation. Static vs Dynamic analysis and tools, Dynamic analysis in-circuit vs emulator, Tooling for dynamic analysis, Reverse engineering firmware, Firmware reversing using emulation.
Programs
View all programsFrom the news
- AMRITA IQAC Head Inaugurates Indian Knowledge Systems (IKS) National Seminar Sponsored by Indian Council for Philosophical Research (ICPR)
- Amrita School of Pharmacy Professor Visits the University of Iceland
Others
- Green consumers purchase intentions and sustainable consumption of organic food products: a conceptual framework for the Indian middle-class market
- Assessment of ChatGPT Adoption in Remote Emerging Market Locations: Application of a Comprehensive Technology Adoption Model