UART THOU MAD?

UART THOU MAD?

Despite the fact that UART has been around FOREVER and is actually frequently used by vulnerability researchers in the hardware space, it has not been discussed as a dedicated topic on its own. This talk is intended to fill that gap. We will provide an overview of what UART is, the tools that exist to work with it and provide examples of why a security researcher should care. We will also explore why UART is a powerful friend for anyone who likes to repurpose hardware. We will also provide BKMs for companies building products that include UART to decrease the likelihood it will be used against them.

Presented by