Answered step by step
Verified Expert Solution
Question
1 Approved Answer
This project will combine the microcontroller and memory management topics that we have discussed this semester to explore secure programming practices in the context of
This project will combine the microcontroller and memory management topics that we have discussed this semester to explore secure programming practices in the context of embedded systems. It involves a simplified implementation of a security system, similar to the one used to secure the Computer Science lab doors in Ayers Hall. This system is written to accept input from a key keypad matrix, connected to one of the BIGs IO ports. The keypads are available in the equipment cabinet in Room and like the other lab equipment, they must be returned to the cabinet when they are not in use! The firmware for this system deliberately exhibits several poor programming practices; in particular, it contains a nasty vulnerability which will allow anyone who understands it to "open the door," even if they do not know any of the correct door codes! The firmware is provided in the attached "Part archive as a HEX file a precompiled binary image; the assignment instructions outline the procedure for downloading this file to your BIG board using the Silicon Labs Flash Programming Tool. Note: "Opening the door" is represented by an animation in the P LED array, so among the other setup steps, be sure that the LED array for Port is properly enabled in the DIP switch bank SW on the BIG board! Your first task will be to discover the nature of the vulnerability, and a minimal and consistent method of exploiting it The vulnerability is related to the memory and security topics recently discussed in class, but beyond that hint, you will be left to discover the details on your own. You will be working individually on this project, so as you work through the discovery of the exploit, Discover the nature of the bug, and determine how to exploit it You should be prepared to outline a precise, minimal, and repeatable list of steps that can consistently reproduce your exploit. Hint: the exploit involves the memory management topics we have discussed recently in class. Review the lecture notes for more details. This project will combine the microcontroller and memory management topics that we have discussed this semester to explore secure programming practices in the context of embedded systems. It involves a simplified implementation of a security system. This system is written to accept input from a key keypad matrix, connected to one of the BIG s I O ports. The firmware for this system deliberately exhibits several poor programming practices; in particular, it contains a nasty vulnerability which will allow anyone who understands it to "open the door," even if they do not know any of the correct door codes! Your first task will be to discover the nature of the vulnerability, and a minimal and consistent method of exploiting it : AE E F F EFDEDC F E : CB A EC DD C DFDC C DF : E E : D B : AE E F E FDEDC F : C A DC DD C DFDC C C : D E E B : A : A A A A : A FFF : E FFFE FDEDC B : AE C D FFD FED FDD FCED : BE C C C : CE C FCE FEEEC E : DE C EE F D FC : EE F A D F FA FBE :
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started
This project will combine the microcontroller and memory management topics that we have discussed this semester to explore secure programming practices in the context of embedded systems. It involves a simplified implementation of a security system, similar to the one used to secure the Computer Science lab doors in Ayers Hall. This system is written to accept input from a key keypad matrix, connected to one of the BIGs IO ports. The keypads are available in the equipment cabinet in Room and like the other lab equipment, they must be returned to the cabinet when they are not in use!
The firmware for this system deliberately exhibits several poor programming practices; in particular, it contains a nasty vulnerability which will allow anyone who understands it to "open the door," even if they do not know any of the correct door codes! The firmware is provided in the attached "Part archive as a HEX file a precompiled binary image; the assignment instructions outline the procedure for downloading this file to your BIG board using the Silicon Labs Flash Programming Tool. Note: "Opening the door" is represented by an animation in the P LED array, so among the other setup steps, be sure that the LED array for Port is properly enabled in the DIP switch bank SW on the BIG board!
Your first task will be to discover the nature of the vulnerability, and a minimal and consistent method of exploiting it The vulnerability is related to the memory and security topics recently discussed in class, but beyond that hint, you will be left to discover the details on your own. You will be working individually on this project, so as you work through the discovery of the exploit,
Discover the nature of the bug, and determine how to exploit it You should be prepared
to outline a precise, minimal, and repeatable list of steps that can consistently reproduce
your exploit. Hint: the exploit involves the memory management topics we have
discussed recently in class. Review the lecture notes for more details.
This project will combine the microcontroller and memory management topics that we have discussed this semester to explore secure programming practices in the context of embedded systems. It involves a simplified implementation of a security system. This system is written to accept input from a
key keypad matrix, connected to one of the BIG
s I
O ports. The firmware for this system deliberately exhibits several poor programming practices; in particular, it contains a nasty vulnerability which will allow anyone who understands it to "open the door," even if they do not know any of the correct door codes! Your first task will be to discover the nature of the vulnerability, and a minimal and consistent method of exploiting it
:
AE
E
F
F
EFDEDC
F
E
:
CB
A
EC
DD
C
DFDC
C
DF
:
E
E
:
D
B
:
AE
E
F
E
FDEDC
F
:
C
A
DC
DD
C
DFDC
C
C
:
D
E
E
B
:
A
:
A
A
A
A
:
A
FFF
:
E
FFFE
FDEDC
B
:
AE
C
D
FFD
FED
FDD
FCED
:
BE
C
C
C
:
CE
C
FCE
FEEEC
E
:
DE
C
EE
F
D
FC
:
EE
F
A
D
F
FA
FBE
:
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started