Automated PCB Reverse Engineering

Total Page:16

File Type:pdf, Size:1020Kb

Automated PCB Reverse Engineering Automated PCB Reverse Engineering Stephan Kleber Henrik Ferdinand Nölscher Frank Kargl [email protected] [email protected] [email protected] Institute of Distributed Systems, Ulm University Abstract the physical circuitry to connect all components, such as microchips. To assess the attack surface and the secu- The very first step for analyzing the security of an em- rity risk induced by the hardware design of a device, the bedded device, without prior knowledge of the device’s analysis of the employed PCB is necessary. To this end, a construction, is analyzing the printed circuit board (PCB) penetration test is a structured process of searching, con- of the device, in order to understand its electrical imple- firming, and reporting vulnerabilities of a specific test mentation. This analysis is called PCB reverse engineer- specimen. Without having access to proprietary specifi- ing and its results are a list of components, technical doc- cations about the device under test, a penetration test is umentation related to those components, and a schematic called black-box test. This is a common and important reconstruction, that illustrates basic connections between kind of penetration testing, since it most closely emu- the PCB’s components. lates the actions of a real attacker. Particularly for em- Motivated by the lack of inexpensive methods for effi- bedded devices, black-box tests are common since most ciently performing PCB reverse engineering, we propose devices use proprietary PCB-designs and there is almost a novel framework that formalizes and automates most no re-use of designs across multiple PCBs of different of the tasks required for PCB reverse engineering. The products and manufacturers. On the other hand, lacking framework is capable of automatically detecting com- the specification makes PCBs hard to analyze. ponents using machine vision, gathering technical docu- To be able to perform a black-box penetration test of mentation from the internet and analyzing technical doc- the PCB of an embedded device without further doc- uments to extract security-relevant information. We im- umentation available, the PCB has to be reverse engi- plement the concept and evaluate the gain of efficiency neered. The PCB reverse engineering task has been in- and analysis coverage. Our results show that automating vestigated for goals like refurbishing or complete recon- almost all steps of PCB reverse engineering is possible. struction. However, existing techniques for these goals Furthermore, we highlight novel use cases that are en- cannot be applied for penetration tests, since they are too abled by our approach. time-consuming, require specialized equipment, such as X-ray units, and often destroy the device under test in the 1 Introduction process. Moreover, there is no formalized process to con- duct the analysis. Thus, the process is unstructured and, More and more embedded devices pervade business pro- from experience, we know that it is tedious and error- cesses and personal activities. From a security perspec- prone, because it involves repetitive manual work. There tive this leads to an increased attack surface and higher are no tools supporting the process to get a high-level un- risk by the common utilization of devices. Securing soft- derstanding of each component’s role, which is required ware can only reduce part of this risk, since in particular for the subsequent penetration test. embedded devices’ security properties are dependent on In this paper we present a workflow and automated the underlying hardware platform. Therefore, an integral method for PCB reverse engineering in preparation of part of a thorough penetration test, to assess the security a black-box penetration test. The goal is to make ana- of a device, is to analyze the hardware implementation, lyzing devices easier, faster, and to improve the cover- as demonstrated by Grand [4] and Oswald et al. [14]. age of the analysis. Since penetration tests are conducted The common basis of all devices is their hardware imple- within a limited amount of time and with access to few mentation as printed circuit boards (PCBs) which contain testing devices only, the process needs to avoid destruc- tion of devices so they can be used for actual attacks, Longbotham et al. [9] describe how a PCB can be re- later on. In essence, this kind of hardware reverse en- constructed using X-ray imaging techniques. They re- gineering considers the components placed on the PCB gard multi-layered PCBs with connection traces stacked and their interconnections. Therefore, the main task our within the board. Therefore, by this method, all layers approach addresses is to identify components, as well as can be inspected and traces can be reconstructed clearly. finding and analyzing their documentation. Moreover, This approach generates a very detailed copy of all layers we show how manual probing for connections between of a PCB, however, it requires removing all the compo- components on the PCB can be augmented by our ap- nents and access to an X-ray machine. These precondi- proach. For component identification, document anal- tions are rarely met in a black-box penetration test. ysis, and connection probing we present a software ar- Johnson [8] shows how traces on a PCB can be ana- chitecture and show its feasibility by a proof-of-concept lyzed using machine vision. He presents a program that implementation. We evaluated multiple methods for the reconstructs traces from the image of a raw PCB. A raw component identification and found that image segmen- PCB is a circuit board that is stripped off components tation is the best alternative for the task. and solder mask. In order to use this approach on arbi- While PCB reverse engineering guides further steps trary PCBs, the analyst needs to unsolder the components during penetration testing, we do not address vulnera- and scrape off the solder mask. This makes it a tiresome bilities of PCBs themselves. Moreover, our method is process and destroys the device, thereby invalidating the not fully automated, but still requires human interven- approach for our scenario. In 2015, Carne presented the tion. Manual steps can not be fully avoided due to the tool “PCBRE” at the conference ReCon [2]. This tool al- fact that we deal with hardware which needs to be han- lows to reconstruct a whole PCB using images of all lay- dled in the first place. However, we show how to reduce ers. These images, again, have to be taken using X-Rays the amount of manual work to the minimum. or other means of analyzing the whole PCB. However, The structure of the paper is as follows: First, we dis- both Johnson and Carne demonstrate that an automated cuss existing approaches of PCB reverse engineering in analysis of PCB traces is possible. Section 2. We derive a common workflow and require- The book “Hacking the Xbox” by Huang [7] outlines ments of its single tasks in Section 3 to provide a basis basic steps to classify and identify components of a PCB. for the automation of this workflow in Section 4.1. Ad- From our experience, we can conclude that manually re- dressing this workflow, we present the design of a soft- peating the required steps, such as reading the part identi- ware architecture in Section 4.2 and its proof-of-concept fication number and manually searching for documenta- implementation in Section 4.3. Our evaluation results tion online is inefficient for complex systems. While the of methods for component identification are discussed in author explains the most basics steps for reverse engi- Section 4.4. Finally, we deduce leverage points for fu- neering an embedded system, the book lacks a workflow ture work in Section 5 before concluding the paper in description for a professional analysis. Section 6. Grand [5] defines a set of attacks on and possible de- fenses for embedded systems. With our approach, we improve the testability and at the same time provide a 2 Related Work more realistic estimation about an attacker’s obstacles when reverse engineering a system to clone it or to find Previous work on automated PCB reverse engineering vulnerabilities on the physical or the firmware level. can be categorized into destructive and non-destructive As already indicated, all presented methods work de- approaches. While destructive methods will destroy the structively, rendering the device unusable after the analy- device during the test procedure, a non-destructive pro- sis. A penetration tester, however, may want to avoid de- cess retains full functionality of the device under test af- stroying the device because of practical, budget, and time ter the analysis. Grand published a survey [6] of all dif- constraints. Previous work highlights the importance of ferent sorts of methods for PCB deconstruction. The goal PCB reverse engineering and suggests that machine vi- of these methods is to fully reverse-engineer a device, by sion can be applied for analyzing PCBs. Yet, none of extracting images of all PCB layers. A PCB’s complete these approaches addresses all required tasks, such as reconstruction, in this case, contains all details of phys- identification of components and gathering of technical ical connections (traces). It highlights that most decon- information. Furthermore, the focus of existing methods struction techniques require destroying the PCB and a lies in analyzing the whole PCB, including all layers of significant amount of either time or cost. We seek for a multi-layered board. Extracting the detailed physical a compromise between the detailed but expensive ap- layout allows sophisticated tasks such as cloning devices proaches and the cheap but tedious manual approach of completely. Nonetheless, it is not required in preparation performing PCB reverse engineering. of a penetration test. 3 Workflow of Manual PCB Reverse Engineering Probing Document Recording Because advanced methods of PCB analysis are costly Component Analysis Gathering of Traces of Results and time-consuming, in practice, analysts perform man- Identification Documentation ual steps to learn how a specific embedded system is built.
Recommended publications
  • What We Know About Testing Embedded Software
    What we know about testing embedded software Vahid Garousi, Hacettepe University and University of Luxembourg Michael Felderer, University of Innsbruck Çağrı Murat Karapıçak, KUASOFT A.Ş. Uğur Yılmaz, ASELSAN A.Ş. Abstract. Embedded systems have overwhelming penetration around the world. Innovations are increasingly triggered by software embedded in automotive, transportation, medical-equipment, communication, energy, and many other types of systems. To test embedded software in a cost effective manner, a large number of test techniques, approaches, tools and frameworks have been proposed by both practitioners and researchers in the last several decades. However, reviewing and getting an overview of the entire state-of-the- art and the –practice in this area is challenging for a practitioner or a (new) researcher. Also unfortunately, we often see that some companies reinvent the wheel (by designing a test approach new to them, but existing in the domain) due to not having an adequate overview of what already exists in this area. To address the above need, we conducted a systematic literature review (SLR) in the form of a systematic mapping (classification) in this area. After compiling an initial pool of 560 papers, a systematic voting was conducted among the authors, and our final pool included 272 technical papers. The review covers the types of testing topics studied, types of testing activity, types of test artifacts generated (e.g., test inputs or test code), and the types of industries in which studies have focused on, e.g., automotive and home appliances. Our article aims to benefit the readers (both practitioners and researchers) by serving as an “index” to the vast body of knowledge in this important and fast-growing area.
    [Show full text]
  • Reverse Engineering Digital Forensics Rodrigo Lopes October 22, 2006
    Reverse Engineering Digital Forensics Rodrigo Lopes October 22, 2006 Introduction Engineering is many times described as making practical application of the knowledge of pure sciences in the solution of a problem or the application of scientific and mathematical principles to develop economical solutions to technical problems, creating products, facilities, and structures that are useful to people. What if the opposite occurs? There is some product that may be a solution to some problem but the inner workings of the solution or even the problem it addresses may be unknown. Reverse engineering is the process of analyzing and understanding a product which functioning and purpose are unknown. In Computer Science in particular, reverse engineering may be defined as the process of analyzing a system's code, documentation, and behavior to identify its current components and their dependencies to extract and create system abstractions and design information. The subject system is not altered; however, additional knowledge about the system is produced. The definition of Reverse Engineering is not peaceful though, especially when it concerns to court and lawsuits. The Reverse Engineering of products protected by copyrighting may be a crime, even if no code is copied. From the software companies’ point of view, Reverse Engineering is many times defined as “Analyzing a product or other output of a process in order to determine how to duplicate the know-how which has been used to create a product or process”. Scope and Goals In the Digital Forensics’ scope, reverse engineering can directly be applied to analyzing unknown and suspicious code in the system, to understand both its goal and inner functioning.
    [Show full text]
  • Embedded Sensors System Applied to Wearable Motion Analysis in Sports
    Embedded Sensors System Applied to Wearable Motion Analysis in Sports Aurélien Valade1, Antony Costes2, Anthony Bouillod1,3, Morgane Mangin4, P. Acco1, Georges Soto-Romero1,4, Jean-Yves Fourniols1 and Frederic Grappe3 1LAAS-CNRS, N2IS, 7, Av. du Colonel Roche 31077, Toulouse, France 2University of Toulouse, UPS, PRiSSMH, Toulouse, France 3EA4660, C3S - Université de Franche Comté, 25000 Besançon, France 4 ISIFC – Génie Biomédical - Université de Franche Comté, 23 Rue Alain Savary, 25000 Besançon, France Keywords: IMU, FPGA, Motion Analysis, Sports, Wearable. Abstract: This paper presents two different wearable motion capture systems for motion analysis in sports, based on inertial measurement units (IMU). One system, called centralized processing, is based on FPGA + microcontroller architecture while the other, called distributed processing, is based on multiple microcontrollers + wireless communication architecture. These architectures are designed to target multi- sports capabilities, beginning with tri-athlete equipment and thus have to be non-invasive and integrated in sportswear, be waterproofed and autonomous in energy. To characterize them, the systems are compared to lab quality references. 1 INTRODUCTION electronics (smartphones, game controllers...), in an autonomous embedded system to monitor the Electronics in sports monitoring has been a growing sportive activity, even in field conditions. field of studies for the last decade. From the heart rate Our IMU based monitoring system allows monitors to the power meters, sportsmen
    [Show full text]
  • 245533753-MIT.Pdf
    THE VULNERABILITY OF TECHNICAL SECRETS TO REVERSE ENGINEERING: IMPLICATIONS FOR COMPANY POLICY By Cenkhan Kodak M.S. in Electrical and Computer Systems Engineering (2001) University of Massachusetts at Amherst Submitted to the Systems Design and Management Program In partial fulfillment of the requirements for the degree of Master of Science in Engineering and Management At the MASSACHUSETTS INSTITUTE OF TECHNOLOGY FEBRUARY 2008 © 2008 Cenkhan Kodak. All rights reserved. The author hereby grants to MIT permission to reproduce and Distribute publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created Signature of the Author: m- /7 Systems Desigq and Management Program r\ Ja iry 2008 Certified by: 7 Professoi ,ric von Hippel Thesis Supervisor, MIT mSchgQl o•.Ma genfer t Certified by: MASSACHUSES INSTITUTE= Pat Hale OF TEOHiNOLOGY Director, Systems Design and Management Program MAY 0 6 2008 I-I .a,:IARCHIVES -2- THE VULNERABILITY OF TECHNICAL SECRETS TO REVERSE ENGINEERING: IMPLICATIONS FOR COMPANY POLICY By Cenkhan Kodak Submitted to the Systems Design and Engineering Program On February 04 2008, in Partial Fulfillment of the Requirements for the Degree of Master of Science in Engineering and Management Abstract In this thesis I will explore the controversial topic of reverse engineering, illustrating with case examples drawn from the data storage industry. I will explore intellectual property rights issues including, users' fair-use provisions that permit reverse engineering. I will also explore the nature of the practice via several types of analyses including: the costs and benefits of reverse engineering; the practical limitations of reverse engineering; and a layered approach to reverse engineering as it applies to complex systems.
    [Show full text]
  • Embedded Systems Supporting by Different Operating Systems
    A Survey: Embedded Systems Supporting By Different Operating Systems Qamar Jabeen, Fazlullah Khan, Muhammad Tahir, Shahzad Khan, Syed Roohullah Jan Department of Computer Science, Abdul Wali Khan University Mardan [email protected], [email protected] -------------------------------------------------------------------------------------------------------------------------------------- Abstract: In these days embedded systems used in industrial, commercial system have an important role in different areas. e.g Mobile Phones and different Fields and applications like Network type of Network Bridges are embedded embedded system , Real-time embedded used by telecommunication systems for systems which supports the mission- giving better requirements to their users. critical domains, mostly having the time We use digital cameras, MP3 players, DVD constraints, Stand-alone systems which players are the example of embedded includes the network router etc. A great consumer electronics. In our daily life its deployment in the processors made for provided us efficiency and flexibility and completing the demanding needs of the many features which includes microwave users. There is also a large-scale oven, washing machines dishwashers. deployment occurs in sensor networks for Embedded system are also used in providing the advance facilities, for medical, transportation and also used in handled such type of embedded systems wireless sensor network area respectively a specific operating system must provide. medical imaging, vital signs, automobile This paper presents some software electric vehicles and Wi-Fi modules. infrastructures that have the ability of supporting such types of embedded systems. 1. Introduction: Embedded system are computer systems designed for specific purpose, to increase functionality and reliability for achieving a specific task, like general Figure 1: Taxonomy of Embedded Software’s purpose computer system it does not use for multiple tasks.
    [Show full text]
  • New Approach for Testing and Providing Security Mechanism for Embedded Systems
    Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 78 ( 2016 ) 851 – 858 International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA New Approach for Testing and providing Security Mechanism for Embedded Systems Swapnili P. Karmorea, Anjali R. Mahajanb Research Scholar, Department of Computer Science and enginnering, G. H. Raisoni College of Engineering, Nagpur, India. Head, Department of Information Technology, Government Polytechnic, Nagpur, India. Abstract Assuring the quality of embedded system is posing a big challenge for software testers around the globe. Testing of one embedded system widely differs from another. The approach presented in the paper is used for the testing of safety critical feature of embedded system. The input and outputs are trained validated and tested via ANN. Security is provided via skipping invalid and critical classes and by embedding secret key in the Ram of embedded device. The work contributes simulating environment where cost and time required for testing of embedded systems will be minimized, which removes drawback of traditional approaches. Keywords: Embedded system testing; Black box testing; Safety critical embedded systems; Artificial neural network. 1. Introduction Testing is the most common process used to determine the quality and providing security for embedded systems. In the embedded world, testing is an immense challenge. In the test plan, the distinguished characteristics of embedded systems must be reflected as these are application specific. They give embedded system exclusive and distinct flavor. Real-time systems have to meet the challenge of assuring the correct implementation of an application not only dependent upon its logical accuracy, but also its ability to meet the constraints of timing.
    [Show full text]
  • Software Security and Reverse Engineering
    Software Security and Reverse Engineering What is reverse engineering? Today the market of software is covered by an incredible number of protected applications, which don't allow you to use all features of programs if you aren't a registered user of these. Reverse engineering is simply the art of removing protection from programs also known as “cracking”. In Some other words cracking is described as follows: - “When you create a program you engineer it, in fact you build the executable from the source-code. The reverse engineering is simply the art of generate a source-code from an executable. Reverse engineering is used to understand how a program does an action, to bypass protection etc. Usually it's not necessary to disassemble all code of the application not only the part of the application that we are interested must be reversed. Reverse engineering used by a cracker to understand the protection scheme and to break it, so it's a very important thing in the whole world of the crack.” In short: - "Reverse Engineering referred to a way to modify a program such that it behaves as the way a reverse engineer wish." “Cracking is a method of making a software program function other than it was Originally intended by means of investigating the code, and, if necessary, patching It.” A Little bit of history Reveres egg. Most probably start with the DOS based computer games. The aim is that a player has full life and armed in the final stage of the game. So what a reverse egg.
    [Show full text]
  • Soft Robotic Hand Prosthesis Using Reverse Engineering and Fast Prototyping
    Proceedings of the 1 st Iberic Conference on Theoretical and Experimental Mechanics and Materials / 11 th National Congress on Experimental Mechanics. Porto/Portugal 4-7 November 2018. Ed. J.F. Silva Gomes. INEGI/FEUP (2018); ISBN: 978-989-20-8771-9; pp. 953-966. PAPER REF: 7452 SOFT ROBOTIC HAND PROSTHESIS USING REVERSE ENGINEERING AND FAST PROTOTYPING Hugo D’Almeida, Tiago Charters, Paulo Almeida, Mário J.G.C. Mendes (*) Instituto Superior de Engenharia de Lisboa (ISEL), Instituto Politécnico de Lisboa, Lisboa, Portugal (*) Email: [email protected] ABSTRACT The present work aimed to develop a soft robotic prosthesis of the human hand using reverse engineering and fast prototyping. This project arises in response to some limitations of the current conventional prostheses, namely aesthetic, mechanical and cost, that fail to fulfil the needs of its users, for example with soft objects. The hand prosthesis design involved the acquisition and processing of a medical image of the user's hand, followed by a modelling process which proved to be highly complex, and finally the obtainment of a real model (by 3D printing) of the prosthesis. The results obtained proved to be satisfactory in the approximation of the hand morphology, low cost and the designed mechanical properties. However, due to some technological limitations (the used 3D printers), and more specifically in the physical conception of the model, its functionality is yet to be proved with the pneumatic control. Keywords: Soft robotics, reverse engineering, fast prototyping, hand prosthesis. INTRODUCTION The human hand can be considered the most used tool by the man in the execution of the daily tasks, and its loss leads to physical and psychological damages.
    [Show full text]
  • Reverse Engineering Is Reverse Forward Engineering)
    RE- ENGINEERING The reengineering of software was described by Chikofsky and Cross in their 1990 paper, as "The examination and alteration of a system to reconstitute it in a new form" . Less formally, reengineering is the modification of a software system that takes place after it has been reverse engineered, generally to add new functionality, or to correct errors. This entire process is often erroneously referred to as reverse engineering; however, it is more accurate to say that reverse engineering is the initial examination of the system, and reengineering is the subsequent modification. Re-engineering is mostly used in the context where a legacy system is involved. Software systems are evolving on high rate because there more research to make the better so therefore software system in most cases, legacy software needs to operate on a new computing platform. 'Re-engineering' is a set of activities that are carried out to re-structure a legacy system to a new system with better functionalities and conform to the hardware and software quality constraint. FORWARD ENGINEERING Forward engineering is the opposite of reverse engineering. In forward engineering, one takes a set of primitives of interest, builds them into a working system, and then observes what the system can and cannot do. Forward engineering is the foundation of synthetic psychology (Braitenberg, 1984; Dawson, 2004; Pfeifer & Scheier, 1999). Braitenberg has argued that forward engineering is likely to produce simpler theories than reverse engineering because the latter tends to attribute behavioural complexities to the internal mechanisms of the agent. Braitenberg calls this the law of uphill analysis and downhill synthesis.
    [Show full text]
  • Reverse Engineering a Legacy Software in a Complex System: a Systems Engineering Approach
    Reverse engineering a legacy software in a complex system: A systems engineering approach Maximiliano Moraga Yang-Yang Zhao University College of Southeast Norway University College of Southeast Norway Kongsberg, Norway Kongsberg, Norway +47 94195982 +47 31009699 [email protected] [email protected] Copyright © 2018 by Maximiliano Moraga and Yang-Yang Zhao. Published and used by INCOSE with permission. Abstract. In a complex system, a legacy software as a component is determined by various factors beyond its own capability. Lack of knowledge that shaped software, which is often the case of a legacy software, can prohibit appropriate maintenance and development to comply with the system needs. To reverse engineering legacy software for a fit with the overall system of interest is a daunting task. Existing techniques of reverse engineering are mostly from a purely technical point of view and for the single discipline of software engineering. Thus, this paper aims for an approach to properly reverse engineer the reasoning behind the legacy software developments in a complex system. By jointly apply the CAFCR model and the reverse engineering, a roadmap is created to guide incremental developments of legacy software in a complex system, which benefits both the maintenance of existing implementation and realization of new functionalities for improved system performance. Introduction Software development has the growing importance for many business successes. One critical issue for an existing business is the maintenance and continuous development of its software. With increasing competition, existing businesses have a tremendous pressure on the fast pace upgrading which left no time for the software to be re-created and re-implemented.
    [Show full text]
  • Towards Efficient Instrumentation for Reverse-Engineering Object Oriented Software Through Static and Dynamic Analyses
    Towards Efficient Instrumentation for Reverse-Engineering Object Oriented Software through Static and Dynamic Analyses by Hossein Mehrfard A dissertation submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements for the degree of Doctor of Philosophy in The Ottawa-Carleton Institute for Electrical and Computer Engineering Carleton University Ottawa, Ontario © 2017 Hossein Mehrfard Abstract In software engineering, program analysis is usually classified according to static analysis (by analyzing source code) and dynamic analysis (by observing program executions). While static analysis provides inaccurate and imprecise results due to programming language's features (e.g., late binding), dynamic analysis produces more accurate and precise results at runtime at the expense of longer executions to collect traces. One prime mechanism to observe executions in dynamic analysis is to instrument either the code or the binary/byte code. Instrumentation overhead potentially poses a serious threat to the accuracy of the dynamic analysis, especially for time dependent software systems (e.g., real-time software), since it can cause those software systems to go out of synchronization. For instance, in a typical real-time software, the dynamic analysis result is correct if the instrumentation overhead, which is due to gathering dynamic information, does not add to the response time of real-time behaviour to the extent that deadlines may be missed. If a deadline is missed, the dynamic analysis result and the system’s output are not accurate. There are two ways to increase accuracy of a dynamic analysis: devising more efficient instrumentation and using a hybrid (static plus dynamic) analysis.
    [Show full text]
  • Reverse Engineering to Teach Scientific Concepts: Biomimetic Robot Systems Vivek Kumar1* 1Team Genius Mentor, CT, USA
    Reverse Engineering to Teach Scientific Concepts: Biomimetic Robot Systems Vivek Kumar1* 1Team Genius Mentor, CT, USA Abstract: This mentor presentation displays how Team Genius mentors teach concepts through the process of reverse engineering. It examines the current applications of re- verse engineering to teach both a scientific concept, in this case, biomimetics, and engi- neering concepts. To begin, we will describe existing robots and prototypes—from re- search labs of Stanford University and the Massachusetts Institute of Technology—with visual aids/models. Later, we will take apart (reverse engineer) working biomimetic LEGO robot prototypes. This structural and functional analysis will convey the biomi- metic concepts integrated within the robots. In the process of examining and reverse engi- neering biomimetic robots, the presentation will convey bioenvironmental concepts with practical application, as well as mechanical engineering strategies. This learning process is akin to one that can be used in a typical biological, environmental science, or engineer- ing classroom. Key Words: Robots, Biomimetics, RoboCupJunior, Environment, iRobot, ERI, Biology, Environmental Science, Education, Classroom, Reverse Engineering 1. Introduction: The educational community is of vital importance. This mentor presentation’s purpose is to explore and display new, innovative ways of presenting STEM (Science, Technology, Engineering, and Math) knowledge in a classroom en- vironment, via robotics. a. Team Genius was founded by Vivek Kumar, now a mentor, in 2010, as a private robotics team. Since its inception, it has won numerous awards, such as FIRST Robotics state championships, the FIRST Programming Awards, and the IEEE Engineering design awards. Team members now look to expand their love of science, innovation, and engineering to the in- ternational community.
    [Show full text]