About this event
Join us for an exciting online seminar where we'll explore the art of firmware dumping. This seminar is perfect for professionals in the field of embedded devices who want to improve their firmware dumping skills or for anyone interested in learning more about the topic.
In this seminar, our security consultant Arun Magesh takes a deep dive into the intricacies of firmware dumping and shows you how to extract firmware from a range of embedded devices. He'll cover various technologies such as NAND, NOR, eMMC, UFS, and internal flash memory, and explore different dumping methods that are more efficient and cost-effective than traditional techniques.
Arun will share their insights and expertise on the latest tools and techniques for successful firmware dumping. We'll discuss the importance of using the right tools and methods to ensure the process is successful, and offer tips on how to approach firmware dumping more effectively.
Whether you're an experienced professional or new to the field, this seminar is perfect for anyone looking to improve their firmware dumping skills. By the end of the seminar, you'll have a deeper understanding of the different dumping methods, the latest tools and techniques available, and how to approach firmware dumping more effectively.
Don't miss out on this informative seminar. Join us and gain the knowledge you need to excel in firmware dumping!
Hosted by
Chris Manivong is a highly experienced cybersecurity professional with a career spanning over 25 years. Now, he serves as a consultant at ONEKEY GmbH, where he is revolutionizing IoT security with innovative solutions. Before, he worked in various architect positions at Rohde&Schwarz, Secusmart.
Jan is an experienced CEO. He worked for IBM, as COO for an international VC firm, founded cybersecurity companies, supported IPOs and served as officer of a NASDAQ-listed holding. Now at ONEKEY, as CEO, he focuses on international growth & to provide a world-class IoT/OT software security solution.
ONEKEY is a specialist for Product Cybersecurity for IoT & OT. Using automatically generated "Digital Twins" and "Software Bill of Materials" of devices, ONEKEY analyzes firmware for security vulnerabilities & compliance violations, without source code, device, or network access.