Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

This project will combine the microcontroller and memory management topics that we have discussed this semester to explore secure programming practices in the context of

This project will combine the microcontroller and memory management topics that we have discussed this semester to explore secure programming practices in the context of embedded systems. It involves a simplified implementation of a security system. This system is written to accept input from a 16-key keypad matrix, connected to one of the BIG8051's I/O ports. The firmware for this system deliberately exhibits several poor programming practices; in particular, it contains a nasty vulnerability which will allow anyone who understands it to "open the door," even if they do not know any of the correct door codes! Your first task will be to discover the nature of the vulnerability, and a minimal and consistent method of exploiting it.
:10053900AE84E4F584758911F58EFDEDC39F5012E3
:10054900758CB0758A3EC28DD28C308DFDC28C0DF2
:0405590080E98E8423
:01055D00227B
:10051300AE84E4F584758911758E02FDEDC39F5099
:1005230012758C38758A9DC28DD28C308DFDC28C2C
:050533000D80E98E843B
:0105380022A0
:10057A00100A3132334134353642373839432A305A
:08058A0023440108000109FFF0
:10019E007FFFE4FDEDC3940474809480400302025B
:1001AE00C8D2FFD2FED2FDD2FCED14605214700301
:1001BE0002024C147003020288240360030202C47C
:1001CE00C2FCE4FEEEC394047480948040030202E9
:1001DE00C4EE14600F1460111460132403701D20FC
:1001EE00F81A800D20F915800820FA10800320FBE4
:1001FE000BED25E025E0240A2EF8E6FF0E80C5C2A1
:10020E00FDE4FEEEC394047480948040030202C4A5
:10021E00EE14600F1460111460132403701D20F887
:10022E001A800D20F915800820FA10800320FB0B90
:10023E00ED25E025E0240A2EF8E6FF0E80C5C2FE6D
:10024E00E4FEEEC3940474809480506AEE14600F42
:10025E001460111460132403701D20F81A800D20F1
:10026E00F915800820FA10800320FB0BED25E02500
:10027E00E0240A2EF8E6FF0E80C8C2FFE4FEEEC3AD
:10028E00940474809480502EEE14600F1460111438
:10029E0060132403701D20F81A800D20F9158008B4
:1002AE0020FA10800320FB0BED25E025E0240A2E1A
:1002BE00F8E6FF0E80C80D0201A2E509B5070FC3CF
:1002CE00E508941274809480500705088003E4F5C5
:0C02DE00088F09E50864117001227FFF01
:0102EA0022F1
:100593007FFFEFFD3395E0FCBCFF08BDFF051201B3
:0305A3009E80EF48
:0105A6002232
:0404E3008E208F21B7
:1004E7001205938F22EF642A601685218285208367
:1004F700E522F00521E5217002052012055E80E066
:0B05070012055E852182852083E4F050
:0105120022C6
:0F05A700383131380032343638003133393700CB
:1002EB00E4900030F0A3F0A3F0751A05751BA77509
:1002FB001C05751DAC751E05751FB112040575C95E
:10030B000AE4F5C875840F7E007F001204E3E490C5
:10031B000030F0A3F0900030E0FEA3E0FFC39403A5
:10032B00EE94005034EF25E0241AF8E6FE08E6AA16
:10033B0006F97BFF78007C007D01120181EF33957C
:10034B00E04F700590003204F0900031E004F07043
:10035B00C4900030E004F080BC900032E

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Students also viewed these Databases questions

Question

3. List ways to manage relationship dynamics

Answered: 1 week ago