This video is still being processed. Please check back later and refresh the page.

Uh oh! Something went wrong, please try again.

25072 SEC3: Cracking a Bitcoin Wallet: Hands-On Research (August 2025)

This security class investigates embedded security through a custom board designed to replicate a real Bitcoin hardware wallet

rate limit

Code not recognized.

About this course

 

Many security vulnerabilities stem from simple oversights, often because system designers struggle to adopt a security-critical perspective on their own creations. This hands-on security class bridges that gap by immersing you in the world of embedded security through a custom board designed to replicate a real Bitcoin hardware wallet. Guided by a lab manual, you’ll write critical security code to enhance the wallet’s features, then shift perspectives to that of a security researcher. In this role, you’ll analyze, identify, and exploit vulnerabilities in the code running on both your board and those of your classmates. Modeled after real-world attacks on hardware wallets and embedded systems, these exercises will expose you to common attack vectors, their consequences, and effective strategies for designing robust security solutions.

Prerequisites:

Basic understanding of cryptographic principles (i.e. know what SHA256, AES, ECDSA are used for) Basic C coding

Curriculum

  • About this course
  • Class Overview
  • Syllabus & Downloads
  • Feedback and Discussion
  • Get in contact with the presentation team
  • We need your feedback

About this course

 

Many security vulnerabilities stem from simple oversights, often because system designers struggle to adopt a security-critical perspective on their own creations. This hands-on security class bridges that gap by immersing you in the world of embedded security through a custom board designed to replicate a real Bitcoin hardware wallet. Guided by a lab manual, you’ll write critical security code to enhance the wallet’s features, then shift perspectives to that of a security researcher. In this role, you’ll analyze, identify, and exploit vulnerabilities in the code running on both your board and those of your classmates. Modeled after real-world attacks on hardware wallets and embedded systems, these exercises will expose you to common attack vectors, their consequences, and effective strategies for designing robust security solutions.

Prerequisites:

Basic understanding of cryptographic principles (i.e. know what SHA256, AES, ECDSA are used for) Basic C coding

Curriculum

  • About this course
  • Class Overview
  • Syllabus & Downloads
  • Feedback and Discussion
  • Get in contact with the presentation team
  • We need your feedback