Grand Idea Studio

Security

Hardware Hacking Training

Wednesday, Dec 14th, 2016

Joe Grand’s Hands-on Hardware Hacking Training teaches techniques to explore, manipulate, and exploit electronic systems. [ continue ]

Every Cloud has a Silver Lining

Wednesday, Dec 14th, 2016

Security is often overlooked during the design process of electronic devices. “We’ll fix it later,” says the engineer. “It’s not worth the cost until something happens,” says the manager. Poor embedded security practices and a lack of clearly defined security goals increase the risk of a product getting hacked, whether for malicious purposes or bragging rights. [ continue ]

Optical Covert Channels

Friday, Oct 14th, 2016

Data exfiltration from a compromised device is usually achieved over the network, via hardware implant, or by manipulating the characteristics of an internal electronic component. Optical covert channels transmit data by modulating visible light in a way that is undetectable to the human eye. [ continue ]

The Pitfalls and Perils of Poor Security

Tuesday, Oct 28th, 2014

Hardware hacking and attacks against embedded systems are no longer limited to hobbyists who simply want to have fun making products do things they were never intended to do. Nation states, criminal organizations, and others looking to maliciously subvert, monitor, manipulate, or intentionally damage are now involved. [ continue ]

Tools of the Hardware Hacking Trade

Wednesday, Apr 23rd, 2014

Many electronic devices contain design flaws that could lead to exploitable vulnerabilities. In order to discover such flaws, hackers and engineers use a variety of tools. This presentation explores the tools commonly used during hardware hacking/reverse engineering, including those that monitor/decode communications, extract firmware, and identify/connect to debug interfaces. [ continue ]

Press

Uses This

Joe Grand

MacroFab Engineering Podcast

Joe Grand: The Origin Story

Atari 2600 Game By Game Podcast

SCSIcide/Ultra SCSIcide with Joe ...