Question: This project will combine the microcontroller and memory management topics that we have discussed this semester to explore secure programming practices in the context of

This project will combine the microcontroller and memory management topics that we have discussed this semester to explore secure programming practices in the context of embedded systems. It involves a simplified implementation of a security system. This system is written to accept input from a 16-key keypad matrix, connected to one of the BIG8051's I/O ports. The firmware for this system deliberately exhibits several poor programming practices; in particular, it contains a nasty vulnerability which will allow anyone who understands it to "open the door," even if they do not know any of the correct door codes! Your first task will be to discover the nature of the vulnerability, and a minimal and consistent method of exploiting it.
:10053900AE84E4F584758911F58EFDEDC39F5012E3
:10054900758CB0758A3EC28DD28C308DFDC28C0DF2
:0405590080E98E8423
:01055D00227B
:10051300AE84E4F584758911758E02FDEDC39F5099
:1005230012758C38758A9DC28DD28C308DFDC28C2C
:050533000D80E98E843B
:0105380022A0
:10057A00100A3132334134353642373839432A305A
:08058A0023440108000109FFF0
:10019E007FFFE4FDEDC3940474809480400302025B
:1001AE00C8D2FFD2FED2FDD2FCED14605214700301
:1001BE0002024C147003020288240360030202C47C
:1001CE00C2FCE4FEEEC394047480948040030202E9
:1001DE00C4EE14600F1460111460132403701D20FC
:1001EE00F81A800D20F915800820FA10800320FBE4
:1001FE000BED25E025E0240A2EF8E6FF0E80C5C2A1
:10020E00FDE4FEEEC394047480948040030202C4A5
:10021E00EE14600F1460111460132403701D20F887
:10022E001A800D20F915800820FA10800320FB0B90
:10023E00ED25E025E0240A2EF8E6FF0E80C5C2FE6D
:10024E00E4FEEEC3940474809480506AEE14600F42
:10025E001460111460132403701D20F81A800D20F1
:10026E00F915800820FA10800320FB0BED25E02500
:10027E00E0240A2EF8E6FF0E80C8C2FFE4FEEEC3AD
:10028E00940474809480502EEE14600F1460111438
:10029E0060132403701D20F81A800D20F9158008B4
:1002AE0020FA10800320FB0BED25E025E0240A2E1A
:1002BE00F8E6FF0E80C80D0201A2E509B5070FC3CF
:1002CE00E508941274809480500705088003E4F5C5
:0C02DE00088F09E50864117001227FFF01
:0102EA0022F1
:100593007FFFEFFD3395E0FCBCFF08BDFF051201B3
:0305A3009E80EF48
:0105A6002232
:0404E3008E208F21B7
:1004E7001205938F22EF642A601685218285208367
:1004F700E522F00521E5217002052012055E80E066
:0B05070012055E852182852083E4F050
:0105120022C6
:0F05A700383131380032343638003133393700CB
:1002EB00E4900030F0A3F0A3F0751A05751BA77509
:1002FB001C05751DAC751E05751FB112040575C95E
:10030B000AE4F5C875840F7E007F001204E3E490C5
:10031B000030F0A3F0900030E0FEA3E0FFC39403A5
:10032B00EE94005034EF25E0241AF8E6FE08E6AA16
:10033B0006F97BFF78007C007D01120181EF33957C
:10034B00E04F700590003204F0900031E004F07043
:10035B00C4900030E004F080BC900032E

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!