SlideShare a Scribd company logo
1 of 30
Arduino Forensics
The application of reverse engineering techniques against the
Arduino microcontrollers to acquire uploaded applications.
Steve Watson
Glasgow Caledonian University
Disclaimer
The opinions expressed and materials shared in this
presentation are my own and may not reflect the
opinions, policies, or procedures of my employer.
Steve Watson DFRWS US 20142
What is Arduino?
● A single board
microcontroller
platform.
● An open source
electronics platform.
Steve Watson DFRWS US 20143
Why are we talking about Arduino?
● New, foundational technology appearing in
many different form factors.
● No clear direction on forensic acquisition of data
on this evolving platform.
Steve Watson DFRWS US 20144
Where is Arduino today?
Steve Watson DFRWS US 20145
Examples - MakerBot Thing-O-Matic
Introduced September 2010 at MakerFaire NYC
Steve Watson DFRWS US 20146
“By 2018, 3D printing
will result in the loss of
at least $100 billion per
year in intellectual
property globally.”
Example - Arduino Phone
http://www.instructables.com/id/ArduinoPhone/
http://blog.arduino.cc/2013/08/12/diy-cellphone/
Steve Watson DFRWS US 20147
Examples - ArduSat
Steve Watson DFRWS US 2014
Steve Watson DFRWS US 2014
Arduino Basics
microcontroller
CPU, RAM and
ROM on a single
chip.
shield
daughter card that
sits on top of the
Arduino
sketch
the code or
application written in
C++ that is
uploaded to the
Arduino
Steve Watson DFRWS US 20149
Is there data to recover?
Where is the data?
Microcontroller Development Systems Remote Endpoints
Steve Watson DFRWS US 201411
What is the data?
Microcontroller Development Systems Remote Endpoints
running applications
(flash)
.ino
(Arduino sketch)
cloud computing updates
(Twitter, Facebook, IoT pages)
NVM, persistent
(eeprom)
.elf
(intermediate step between
c++ and assembly)
control messages
(c&c of other microcontroller
devices)
.csv, .txt
(asci or hex on SDCARD)
.hex
(assembly)
.txt, .csv
Fuses
(single byte hex values)
.json
(JSON calls to other
applications)
Steve Watson DFRWS US 201412
How I approach new devices
1. What is the operating system?
2. What is the storage?
3. What is the connectivity?
4. How is the system updated, installed, accessed?
5. What are the parallels with other systems and
devices?
6. What existing documentation and information
exists?
Steve Watson DFRWS US 201413
Focus on the Arduino
Connection to the target
1. Chip removal (chip-off equivalent)
2. Tethered to another Arduino (computer to
computer equivalent)
3. Connect to a programming port on the board
(JTAG equivalent)
Steve Watson DFRWS US 201415
Connection: Chip-off
Example: ZIF Socket 28-Pin, https://www.sparkfun.com/products/9175
Steve Watson DFRWS US 201416
Connection: Tethered Arduino
Arduino Tutorial:
Using an Arduino as an AVR ISP (In-System
Programmer)
http://arduino.cc/en/Tutorial/ArduinoISP
Steve Watson DFRWS US 201417
Connection: JTAG Equivalent
Olimex STK500v2
connected via ICSP to an
Arduino UNO
Steve Watson DFRWS US 201418
Connection: ICSP
ICSP - In-Circuit Serial Programming
Steve Watson DFRWS US 201419
Software used to acquire
1. AVRDUDE - AVR Downloader/UploaDEr
a. opensource
b. http://www.nongnu.org/avrdude/
c. Included in the Arduino IDE install under install directory
../Arduino/hardware/tools/avr/bin/avrdude.exe
2. Atmel AVR Studio
a. Free development environment for Atmel AVR 8- and 32-
bit MCUs.
Steve Watson DFRWS US 201420
Data to acquire
Flash (32KB)
EEPROM (1KB)
● NVM reserved for persistence across uploads
Fuses (1B x 3 reserved)
● lfuse, hfuse, efuse
● single byte hex configurations related to clock, bootloader
and voltage (see reference slide for more detail)
Steve Watson DFRWS US 201421
Software: AVRDUDE
Example: Read flash memory and dump hex to specific file.
avrdude -p m328p -c stk500v2 -P com4 -U flash:r:"[path/to/file/filename.hex]":r
-p [part number]
-c [programmer]
-P [com port]
-U [memory operation]
● Note the :r: and :r to define READ
● change ‘flash’ to eeprom, lfuse, hfuse and/or efuse to acquire reserved
portions.
Steve Watson DFRWS US 201422
Software: AVRDUDE
C:appsavrdude -p m328p -c stk500v2 -P com4 -U flash:r:"c:/temp/arduino_uno.hex":r
avrdude: AVR device initialized and ready to accept instructions
Reading | ################################################## | 100% 0.03s
avrdude: Device signature = 0x1e950f
avrdude: reading flash memory:
Reading | ################################################## | 100% 94.89s
avrdude: writing output file "c:/temp/arduino_uno.hex"
avrdude: safemode: Fuses OK (E:05, H:D6, L:FF)
avrdude done. Thank you.
Steve Watson DFRWS US 201423
Software: Atmel Studio
Steve Watson DFRWS US 201424
Full walkthrough (screenshots) of an MCU
acquisition in the backup slides.
Investigations where data may be needed
1. Supply chain investigations
2. Malware analysis
3. Improvised devices
4. Automation and control systems
5. Medical, fitness
6. Security, access control
7. Drones
8. Cloud
Steve Watson DFRWS US 201425
Where is the rest of the slide deck?
Please reach out for
assistance, additional
information, or for access to
the rest of the slides in the
backup material.
Steve Watson DFRWS US 201426
Contact Options:
01100110 01101111 01110010 01100101 01101110 01110011 01101001 01100011 01000000
01110011 01110100 01100101 01110110 01100101 01110111 01100001 01110100 01110011
01101111 01101110 00101110 01101110 01100101 01110100
stevewatson.net
Twitter @stevewatson
LinkedIn - watsonsteve
Thank you!
Credits
title slide - Arduino schematic, http://arduino.cc/en/uploads/Main/arduino-uno-schematic.pdf
slide 3 - Arduino UNO photo, http://arduino.cc/en/uploads/Main/ArduinoUno_R3_Front.jpg
slide 5 - Icons made by www.flaticon.com
slide 6 - Image http://upload.wikimedia.org/wikipedia/commons/8/87/Makerbot_Thing-O-Matic_Assembled_Printing_Blue_Rabbit.jpg
http://www.gartner.com/newsroom/id/2603215
slide 7 - http://blog.arduino.cc/2013/08/12/diy-cellphone/, http://farm6.staticflickr.com/5475/9474701418_798e142291.jpg, http:
//www.instructables.com/id/ArduinoPhone/
slide 8 - Screenshots and images in order of animation: https://www.kickstarter.com/projects/575960623/ardusat-your-arduino-
experiment-in-space, http://www.blogcdn.com/www.engadget.com/media/2012/06/ardustat8388676666666.jpg
slide 11 - Icons made by www.flaticon.com
slide 16 - Example: ZIF Socket 28-Pin, https://www.sparkfun.com/products/9175
slide 17 - image created with Fritzing
slide 19 - monochrome images http://allaboutee.com/2011/05/11/how-to-program-an-avr-microcontroller/

More Related Content

What's hot

Penetrasyon Testlerinde Açık Kod Yazılımların Kullanımı
Penetrasyon Testlerinde Açık Kod Yazılımların KullanımıPenetrasyon Testlerinde Açık Kod Yazılımların Kullanımı
Penetrasyon Testlerinde Açık Kod Yazılımların KullanımıBGA Cyber Security
 
Lecture_10_AML_in_Network_Intrusion_Detection (3).pptx
Lecture_10_AML_in_Network_Intrusion_Detection (3).pptxLecture_10_AML_in_Network_Intrusion_Detection (3).pptx
Lecture_10_AML_in_Network_Intrusion_Detection (3).pptxAditi943522
 
OSINT (Open Source Intelligence) Market - 2017 2022 - Sample Report
OSINT (Open Source Intelligence) Market - 2017 2022 - Sample ReportOSINT (Open Source Intelligence) Market - 2017 2022 - Sample Report
OSINT (Open Source Intelligence) Market - 2017 2022 - Sample ReportHomeland Security Research Corp.
 
Lessons from a Red Team Exercise
Lessons from a Red Team ExerciseLessons from a Red Team Exercise
Lessons from a Red Team ExercisePeter Wood
 
Siber Tehdit Avcılığı (Threat Hunting)
Siber Tehdit Avcılığı (Threat Hunting)Siber Tehdit Avcılığı (Threat Hunting)
Siber Tehdit Avcılığı (Threat Hunting)BGA Cyber Security
 
Netcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beemaNetcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beemaRaghunath G
 
3. parti firma risklerinden nasıl korunulur?
3. parti firma risklerinden nasıl korunulur?3. parti firma risklerinden nasıl korunulur?
3. parti firma risklerinden nasıl korunulur?BGA Cyber Security
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }AkshayJha40
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)Aj Maurya
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemMohit Belwal
 
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36   privilege escalation exploitExploit access root to kernel 2.6.32 2.6.36   privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploitCarlos Eduardo
 
LINUX, WINDOWS VE AĞ SİSTEMLERİ SIZMA TESTLERİ
LINUX, WINDOWS VE AĞ SİSTEMLERİ SIZMA TESTLERİ LINUX, WINDOWS VE AĞ SİSTEMLERİ SIZMA TESTLERİ
LINUX, WINDOWS VE AĞ SİSTEMLERİ SIZMA TESTLERİ BGA Cyber Security
 
Biomedical Relation Extraction for Knowledge Graph Completion
Biomedical Relation Extraction for Knowledge Graph CompletionBiomedical Relation Extraction for Knowledge Graph Completion
Biomedical Relation Extraction for Knowledge Graph CompletionClaudiu Mihăilă
 
Siber İstihbarat Eğitim Dokümanı
Siber İstihbarat Eğitim DokümanıSiber İstihbarat Eğitim Dokümanı
Siber İstihbarat Eğitim DokümanıBGA Cyber Security
 
Cyber Purple Teaming: Uniting Blue and Red Teams - B Sides San Antonio - Albe...
Cyber Purple Teaming: Uniting Blue and Red Teams - B Sides San Antonio - Albe...Cyber Purple Teaming: Uniting Blue and Red Teams - B Sides San Antonio - Albe...
Cyber Purple Teaming: Uniting Blue and Red Teams - B Sides San Antonio - Albe...Denim Group
 

What's hot (20)

DDOS Attack
DDOS Attack DDOS Attack
DDOS Attack
 
Penetrasyon Testlerinde Açık Kod Yazılımların Kullanımı
Penetrasyon Testlerinde Açık Kod Yazılımların KullanımıPenetrasyon Testlerinde Açık Kod Yazılımların Kullanımı
Penetrasyon Testlerinde Açık Kod Yazılımların Kullanımı
 
Lecture_10_AML_in_Network_Intrusion_Detection (3).pptx
Lecture_10_AML_in_Network_Intrusion_Detection (3).pptxLecture_10_AML_in_Network_Intrusion_Detection (3).pptx
Lecture_10_AML_in_Network_Intrusion_Detection (3).pptx
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
OSINT (Open Source Intelligence) Market - 2017 2022 - Sample Report
OSINT (Open Source Intelligence) Market - 2017 2022 - Sample ReportOSINT (Open Source Intelligence) Market - 2017 2022 - Sample Report
OSINT (Open Source Intelligence) Market - 2017 2022 - Sample Report
 
Cyber Kill Chain
Cyber Kill ChainCyber Kill Chain
Cyber Kill Chain
 
Lessons from a Red Team Exercise
Lessons from a Red Team ExerciseLessons from a Red Team Exercise
Lessons from a Red Team Exercise
 
Siber Tehdit Avcılığı (Threat Hunting)
Siber Tehdit Avcılığı (Threat Hunting)Siber Tehdit Avcılığı (Threat Hunting)
Siber Tehdit Avcılığı (Threat Hunting)
 
Netcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beemaNetcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beema
 
3. parti firma risklerinden nasıl korunulur?
3. parti firma risklerinden nasıl korunulur?3. parti firma risklerinden nasıl korunulur?
3. parti firma risklerinden nasıl korunulur?
 
Tools kali
Tools kaliTools kali
Tools kali
 
BTRisk Zararlı Yazılım Analizi Eğitimi Sunumu - Bölüm 1
BTRisk Zararlı Yazılım Analizi Eğitimi Sunumu - Bölüm 1BTRisk Zararlı Yazılım Analizi Eğitimi Sunumu - Bölüm 1
BTRisk Zararlı Yazılım Analizi Eğitimi Sunumu - Bölüm 1
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36   privilege escalation exploitExploit access root to kernel 2.6.32 2.6.36   privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploit
 
LINUX, WINDOWS VE AĞ SİSTEMLERİ SIZMA TESTLERİ
LINUX, WINDOWS VE AĞ SİSTEMLERİ SIZMA TESTLERİ LINUX, WINDOWS VE AĞ SİSTEMLERİ SIZMA TESTLERİ
LINUX, WINDOWS VE AĞ SİSTEMLERİ SIZMA TESTLERİ
 
Biomedical Relation Extraction for Knowledge Graph Completion
Biomedical Relation Extraction for Knowledge Graph CompletionBiomedical Relation Extraction for Knowledge Graph Completion
Biomedical Relation Extraction for Knowledge Graph Completion
 
Siber İstihbarat Eğitim Dokümanı
Siber İstihbarat Eğitim DokümanıSiber İstihbarat Eğitim Dokümanı
Siber İstihbarat Eğitim Dokümanı
 
Cyber Purple Teaming: Uniting Blue and Red Teams - B Sides San Antonio - Albe...
Cyber Purple Teaming: Uniting Blue and Red Teams - B Sides San Antonio - Albe...Cyber Purple Teaming: Uniting Blue and Red Teams - B Sides San Antonio - Albe...
Cyber Purple Teaming: Uniting Blue and Red Teams - B Sides San Antonio - Albe...
 

Viewers also liked

Wearable Device Forensics
Wearable Device ForensicsWearable Device Forensics
Wearable Device ForensicsSteve Watson
 
Hacker's and painters Hardware Hacking 101 - 10th Oct 2014
Hacker's and painters Hardware Hacking 101 - 10th Oct 2014Hacker's and painters Hardware Hacking 101 - 10th Oct 2014
Hacker's and painters Hardware Hacking 101 - 10th Oct 2014Takeda Pharmaceuticals
 
Digital Forensics and Incident Response (DFIR) using Docker Containers
Digital Forensics and Incident Response (DFIR) using Docker ContainersDigital Forensics and Incident Response (DFIR) using Docker Containers
Digital Forensics and Incident Response (DFIR) using Docker ContainersDeep Shankar Yadav
 
Beauty of open source in cyber forensics
Beauty of open source in cyber forensicsBeauty of open source in cyber forensics
Beauty of open source in cyber forensicssaddamhusain hadimani
 
Hardware Hacking caso práctico Ingeniería Inversa Smartcards
Hardware Hacking caso práctico Ingeniería Inversa SmartcardsHardware Hacking caso práctico Ingeniería Inversa Smartcards
Hardware Hacking caso práctico Ingeniería Inversa SmartcardsAndres Lozano
 
Hardware Hacking in schools (ACEC2014)
Hardware Hacking in schools (ACEC2014)Hardware Hacking in schools (ACEC2014)
Hardware Hacking in schools (ACEC2014)Dan Bowen
 
amrapali builders @@ hardware hacking and robotics using the raspberry pi.pdf
amrapali builders @@ hardware hacking and robotics using the raspberry pi.pdfamrapali builders @@ hardware hacking and robotics using the raspberry pi.pdf
amrapali builders @@ hardware hacking and robotics using the raspberry pi.pdfamrapalibuildersreviews
 
Intro to Hardware Firmware Hacking
Intro to Hardware Firmware HackingIntro to Hardware Firmware Hacking
Intro to Hardware Firmware HackingAndrew Freeborn
 
BSides DFW2016-Hack Mode Enabled
BSides DFW2016-Hack Mode EnabledBSides DFW2016-Hack Mode Enabled
BSides DFW2016-Hack Mode Enabledpricemcdonald
 
A BEGINNER’S JOURNEY INTO THE WORLD OF HARDWARE HACKING
A BEGINNER’S JOURNEY INTO THE WORLD OF HARDWARE HACKINGA BEGINNER’S JOURNEY INTO THE WORLD OF HARDWARE HACKING
A BEGINNER’S JOURNEY INTO THE WORLD OF HARDWARE HACKINGSilvio Cesare
 
Coders need to learn hardware hacking NOW
Coders need to learn hardware hacking NOWCoders need to learn hardware hacking NOW
Coders need to learn hardware hacking NOWMatt Biddulph
 
Cost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learningCost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learningSabidur Rahman
 
JTAG Interface (Intro)
JTAG Interface (Intro)JTAG Interface (Intro)
JTAG Interface (Intro)Nitesh Bhatia
 

Viewers also liked (20)

Router forensics
Router forensicsRouter forensics
Router forensics
 
Wearable Device Forensics
Wearable Device ForensicsWearable Device Forensics
Wearable Device Forensics
 
Hacker's and painters Hardware Hacking 101 - 10th Oct 2014
Hacker's and painters Hardware Hacking 101 - 10th Oct 2014Hacker's and painters Hardware Hacking 101 - 10th Oct 2014
Hacker's and painters Hardware Hacking 101 - 10th Oct 2014
 
Digital Forensics and Incident Response (DFIR) using Docker Containers
Digital Forensics and Incident Response (DFIR) using Docker ContainersDigital Forensics and Incident Response (DFIR) using Docker Containers
Digital Forensics and Incident Response (DFIR) using Docker Containers
 
Beauty of open source in cyber forensics
Beauty of open source in cyber forensicsBeauty of open source in cyber forensics
Beauty of open source in cyber forensics
 
Hardware Hacking caso práctico Ingeniería Inversa Smartcards
Hardware Hacking caso práctico Ingeniería Inversa SmartcardsHardware Hacking caso práctico Ingeniería Inversa Smartcards
Hardware Hacking caso práctico Ingeniería Inversa Smartcards
 
Hardware Hacking in schools (ACEC2014)
Hardware Hacking in schools (ACEC2014)Hardware Hacking in schools (ACEC2014)
Hardware Hacking in schools (ACEC2014)
 
Playful
PlayfulPlayful
Playful
 
amrapali builders @@ hardware hacking and robotics using the raspberry pi.pdf
amrapali builders @@ hardware hacking and robotics using the raspberry pi.pdfamrapali builders @@ hardware hacking and robotics using the raspberry pi.pdf
amrapali builders @@ hardware hacking and robotics using the raspberry pi.pdf
 
Intro to Hardware Firmware Hacking
Intro to Hardware Firmware HackingIntro to Hardware Firmware Hacking
Intro to Hardware Firmware Hacking
 
Hardware Hacking Primer
Hardware Hacking PrimerHardware Hacking Primer
Hardware Hacking Primer
 
Hardware hacking
Hardware hackingHardware hacking
Hardware hacking
 
BSides DFW2016-Hack Mode Enabled
BSides DFW2016-Hack Mode EnabledBSides DFW2016-Hack Mode Enabled
BSides DFW2016-Hack Mode Enabled
 
A BEGINNER’S JOURNEY INTO THE WORLD OF HARDWARE HACKING
A BEGINNER’S JOURNEY INTO THE WORLD OF HARDWARE HACKINGA BEGINNER’S JOURNEY INTO THE WORLD OF HARDWARE HACKING
A BEGINNER’S JOURNEY INTO THE WORLD OF HARDWARE HACKING
 
Breaking Bad EACS Implementations
Breaking Bad EACS ImplementationsBreaking Bad EACS Implementations
Breaking Bad EACS Implementations
 
Coders need to learn hardware hacking NOW
Coders need to learn hardware hacking NOWCoders need to learn hardware hacking NOW
Coders need to learn hardware hacking NOW
 
Cost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learningCost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learning
 
Hardware hacking 101
Hardware hacking 101Hardware hacking 101
Hardware hacking 101
 
JTAG Interface (Intro)
JTAG Interface (Intro)JTAG Interface (Intro)
JTAG Interface (Intro)
 
Deft
DeftDeft
Deft
 

Similar to Arduino Forensics

Intro to arduino
Intro to arduinoIntro to arduino
Intro to arduinoJosé Faria
 
Getting started with Intel IoT Developer Kit
Getting started with Intel IoT Developer KitGetting started with Intel IoT Developer Kit
Getting started with Intel IoT Developer KitSulamita Garcia
 
Internet of Things Conference - Bogor city
Internet of Things Conference - Bogor cityInternet of Things Conference - Bogor city
Internet of Things Conference - Bogor cityAndri Yadi
 
BURO Arduino Workshop
BURO Arduino WorkshopBURO Arduino Workshop
BURO Arduino WorkshopOmer Kilic
 
Arduino Based Smart Parking System
Arduino Based Smart Parking SystemArduino Based Smart Parking System
Arduino Based Smart Parking SystemIRJET Journal
 
Lab Handson: Power your Creations with Intel Edison!
Lab Handson: Power your Creations with Intel Edison!Lab Handson: Power your Creations with Intel Edison!
Lab Handson: Power your Creations with Intel Edison!Codemotion
 
Arduino Development For Beginners
Arduino Development For BeginnersArduino Development For Beginners
Arduino Development For BeginnersFTS seminar
 
From printed circuit boards to exploits
From printed circuit boards to exploitsFrom printed circuit boards to exploits
From printed circuit boards to exploitsvirtualabs
 
Webshield internet of things
Webshield internet of thingsWebshield internet of things
Webshield internet of thingsRaghav Shetty
 
IoT with openHAB on pcDuino3B
IoT with openHAB on pcDuino3BIoT with openHAB on pcDuino3B
IoT with openHAB on pcDuino3BJingfeng Liu
 
Using arduino and raspberry pi for internet of things
Using arduino and raspberry pi for internet of thingsUsing arduino and raspberry pi for internet of things
Using arduino and raspberry pi for internet of thingsSudar Muthu
 
IRJET- Biometric Attendance System
IRJET- Biometric Attendance SystemIRJET- Biometric Attendance System
IRJET- Biometric Attendance SystemIRJET Journal
 
Automatic Plant Watering System using Arduino UNO for University Park
Automatic Plant Watering System using Arduino UNO for University ParkAutomatic Plant Watering System using Arduino UNO for University Park
Automatic Plant Watering System using Arduino UNO for University Parkijtsrd
 
pcDuino Presentation at SparkFun
pcDuino Presentation at SparkFunpcDuino Presentation at SparkFun
pcDuino Presentation at SparkFunJingfeng Liu
 
What are the different types of arduino boards
What are the different types of arduino boardsWhat are the different types of arduino boards
What are the different types of arduino boardselprocus
 
INTELLIGENT HELMET DETECTION USING OPENCV AND MACHINE LEARNING
INTELLIGENT HELMET DETECTION USING OPENCV AND MACHINE LEARNINGINTELLIGENT HELMET DETECTION USING OPENCV AND MACHINE LEARNING
INTELLIGENT HELMET DETECTION USING OPENCV AND MACHINE LEARNINGIRJET Journal
 

Similar to Arduino Forensics (20)

Intro to arduino
Intro to arduinoIntro to arduino
Intro to arduino
 
Getting started with Intel IoT Developer Kit
Getting started with Intel IoT Developer KitGetting started with Intel IoT Developer Kit
Getting started with Intel IoT Developer Kit
 
Internet of Things Conference - Bogor city
Internet of Things Conference - Bogor cityInternet of Things Conference - Bogor city
Internet of Things Conference - Bogor city
 
BURO Arduino Workshop
BURO Arduino WorkshopBURO Arduino Workshop
BURO Arduino Workshop
 
503
503503
503
 
Arduino Based Smart Parking System
Arduino Based Smart Parking SystemArduino Based Smart Parking System
Arduino Based Smart Parking System
 
Lab Handson: Power your Creations with Intel Edison!
Lab Handson: Power your Creations with Intel Edison!Lab Handson: Power your Creations with Intel Edison!
Lab Handson: Power your Creations with Intel Edison!
 
Arduino Development For Beginners
Arduino Development For BeginnersArduino Development For Beginners
Arduino Development For Beginners
 
From printed circuit boards to exploits
From printed circuit boards to exploitsFrom printed circuit boards to exploits
From printed circuit boards to exploits
 
Udev
UdevUdev
Udev
 
Webshield internet of things
Webshield internet of thingsWebshield internet of things
Webshield internet of things
 
Introduction of Arduino Uno
Introduction of Arduino UnoIntroduction of Arduino Uno
Introduction of Arduino Uno
 
IoT with openHAB on pcDuino3B
IoT with openHAB on pcDuino3BIoT with openHAB on pcDuino3B
IoT with openHAB on pcDuino3B
 
Using arduino and raspberry pi for internet of things
Using arduino and raspberry pi for internet of thingsUsing arduino and raspberry pi for internet of things
Using arduino and raspberry pi for internet of things
 
Johnny-Five
Johnny-FiveJohnny-Five
Johnny-Five
 
IRJET- Biometric Attendance System
IRJET- Biometric Attendance SystemIRJET- Biometric Attendance System
IRJET- Biometric Attendance System
 
Automatic Plant Watering System using Arduino UNO for University Park
Automatic Plant Watering System using Arduino UNO for University ParkAutomatic Plant Watering System using Arduino UNO for University Park
Automatic Plant Watering System using Arduino UNO for University Park
 
pcDuino Presentation at SparkFun
pcDuino Presentation at SparkFunpcDuino Presentation at SparkFun
pcDuino Presentation at SparkFun
 
What are the different types of arduino boards
What are the different types of arduino boardsWhat are the different types of arduino boards
What are the different types of arduino boards
 
INTELLIGENT HELMET DETECTION USING OPENCV AND MACHINE LEARNING
INTELLIGENT HELMET DETECTION USING OPENCV AND MACHINE LEARNINGINTELLIGENT HELMET DETECTION USING OPENCV AND MACHINE LEARNING
INTELLIGENT HELMET DETECTION USING OPENCV AND MACHINE LEARNING
 

Recently uploaded

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

Arduino Forensics

  • 1. Arduino Forensics The application of reverse engineering techniques against the Arduino microcontrollers to acquire uploaded applications. Steve Watson Glasgow Caledonian University
  • 2. Disclaimer The opinions expressed and materials shared in this presentation are my own and may not reflect the opinions, policies, or procedures of my employer. Steve Watson DFRWS US 20142
  • 3. What is Arduino? ● A single board microcontroller platform. ● An open source electronics platform. Steve Watson DFRWS US 20143
  • 4. Why are we talking about Arduino? ● New, foundational technology appearing in many different form factors. ● No clear direction on forensic acquisition of data on this evolving platform. Steve Watson DFRWS US 20144
  • 5. Where is Arduino today? Steve Watson DFRWS US 20145
  • 6. Examples - MakerBot Thing-O-Matic Introduced September 2010 at MakerFaire NYC Steve Watson DFRWS US 20146
  • 7. “By 2018, 3D printing will result in the loss of at least $100 billion per year in intellectual property globally.”
  • 8. Example - Arduino Phone http://www.instructables.com/id/ArduinoPhone/ http://blog.arduino.cc/2013/08/12/diy-cellphone/ Steve Watson DFRWS US 20147
  • 9. Examples - ArduSat Steve Watson DFRWS US 2014
  • 11. Arduino Basics microcontroller CPU, RAM and ROM on a single chip. shield daughter card that sits on top of the Arduino sketch the code or application written in C++ that is uploaded to the Arduino Steve Watson DFRWS US 20149
  • 12. Is there data to recover?
  • 13. Where is the data? Microcontroller Development Systems Remote Endpoints Steve Watson DFRWS US 201411
  • 14. What is the data? Microcontroller Development Systems Remote Endpoints running applications (flash) .ino (Arduino sketch) cloud computing updates (Twitter, Facebook, IoT pages) NVM, persistent (eeprom) .elf (intermediate step between c++ and assembly) control messages (c&c of other microcontroller devices) .csv, .txt (asci or hex on SDCARD) .hex (assembly) .txt, .csv Fuses (single byte hex values) .json (JSON calls to other applications) Steve Watson DFRWS US 201412
  • 15. How I approach new devices 1. What is the operating system? 2. What is the storage? 3. What is the connectivity? 4. How is the system updated, installed, accessed? 5. What are the parallels with other systems and devices? 6. What existing documentation and information exists? Steve Watson DFRWS US 201413
  • 16. Focus on the Arduino
  • 17. Connection to the target 1. Chip removal (chip-off equivalent) 2. Tethered to another Arduino (computer to computer equivalent) 3. Connect to a programming port on the board (JTAG equivalent) Steve Watson DFRWS US 201415
  • 18. Connection: Chip-off Example: ZIF Socket 28-Pin, https://www.sparkfun.com/products/9175 Steve Watson DFRWS US 201416
  • 19. Connection: Tethered Arduino Arduino Tutorial: Using an Arduino as an AVR ISP (In-System Programmer) http://arduino.cc/en/Tutorial/ArduinoISP Steve Watson DFRWS US 201417
  • 20. Connection: JTAG Equivalent Olimex STK500v2 connected via ICSP to an Arduino UNO Steve Watson DFRWS US 201418
  • 21. Connection: ICSP ICSP - In-Circuit Serial Programming Steve Watson DFRWS US 201419
  • 22. Software used to acquire 1. AVRDUDE - AVR Downloader/UploaDEr a. opensource b. http://www.nongnu.org/avrdude/ c. Included in the Arduino IDE install under install directory ../Arduino/hardware/tools/avr/bin/avrdude.exe 2. Atmel AVR Studio a. Free development environment for Atmel AVR 8- and 32- bit MCUs. Steve Watson DFRWS US 201420
  • 23. Data to acquire Flash (32KB) EEPROM (1KB) ● NVM reserved for persistence across uploads Fuses (1B x 3 reserved) ● lfuse, hfuse, efuse ● single byte hex configurations related to clock, bootloader and voltage (see reference slide for more detail) Steve Watson DFRWS US 201421
  • 24. Software: AVRDUDE Example: Read flash memory and dump hex to specific file. avrdude -p m328p -c stk500v2 -P com4 -U flash:r:"[path/to/file/filename.hex]":r -p [part number] -c [programmer] -P [com port] -U [memory operation] ● Note the :r: and :r to define READ ● change ‘flash’ to eeprom, lfuse, hfuse and/or efuse to acquire reserved portions. Steve Watson DFRWS US 201422
  • 25. Software: AVRDUDE C:appsavrdude -p m328p -c stk500v2 -P com4 -U flash:r:"c:/temp/arduino_uno.hex":r avrdude: AVR device initialized and ready to accept instructions Reading | ################################################## | 100% 0.03s avrdude: Device signature = 0x1e950f avrdude: reading flash memory: Reading | ################################################## | 100% 94.89s avrdude: writing output file "c:/temp/arduino_uno.hex" avrdude: safemode: Fuses OK (E:05, H:D6, L:FF) avrdude done. Thank you. Steve Watson DFRWS US 201423
  • 26. Software: Atmel Studio Steve Watson DFRWS US 201424 Full walkthrough (screenshots) of an MCU acquisition in the backup slides.
  • 27. Investigations where data may be needed 1. Supply chain investigations 2. Malware analysis 3. Improvised devices 4. Automation and control systems 5. Medical, fitness 6. Security, access control 7. Drones 8. Cloud Steve Watson DFRWS US 201425
  • 28. Where is the rest of the slide deck? Please reach out for assistance, additional information, or for access to the rest of the slides in the backup material. Steve Watson DFRWS US 201426
  • 29. Contact Options: 01100110 01101111 01110010 01100101 01101110 01110011 01101001 01100011 01000000 01110011 01110100 01100101 01110110 01100101 01110111 01100001 01110100 01110011 01101111 01101110 00101110 01101110 01100101 01110100 stevewatson.net Twitter @stevewatson LinkedIn - watsonsteve Thank you!
  • 30. Credits title slide - Arduino schematic, http://arduino.cc/en/uploads/Main/arduino-uno-schematic.pdf slide 3 - Arduino UNO photo, http://arduino.cc/en/uploads/Main/ArduinoUno_R3_Front.jpg slide 5 - Icons made by www.flaticon.com slide 6 - Image http://upload.wikimedia.org/wikipedia/commons/8/87/Makerbot_Thing-O-Matic_Assembled_Printing_Blue_Rabbit.jpg http://www.gartner.com/newsroom/id/2603215 slide 7 - http://blog.arduino.cc/2013/08/12/diy-cellphone/, http://farm6.staticflickr.com/5475/9474701418_798e142291.jpg, http: //www.instructables.com/id/ArduinoPhone/ slide 8 - Screenshots and images in order of animation: https://www.kickstarter.com/projects/575960623/ardusat-your-arduino- experiment-in-space, http://www.blogcdn.com/www.engadget.com/media/2012/06/ardustat8388676666666.jpg slide 11 - Icons made by www.flaticon.com slide 16 - Example: ZIF Socket 28-Pin, https://www.sparkfun.com/products/9175 slide 17 - image created with Fritzing slide 19 - monochrome images http://allaboutee.com/2011/05/11/how-to-program-an-avr-microcontroller/