| 2025-08-07 | Talk | Blackhat |
Uncovering ‘NASty’ 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing
| Kanika Gupta | reverse-engineeringfirmware-analysismobile-security+2 |
| 2025-04-04 | Tool demo | Blackhat |
CompartIoT
| Sreesankar S, Aditya Krishna Vinod, Season Cherian | microcontrollers |
| 2025-04-03 | Tool demo | Blackhat |
CompartIoT
| Sreesankar S, Aditya Krishna Vinod, Season Cherian | microcontrollers |
| 2025-03-02 | Talk | Nullcon |
Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks
| Shyam Kumar Arshid, Chinmay Krishna | embedded-securityfirmware-analysishardware-security+3 |
| 2024-11-21 | Talk | Deepsec |
Hacking with Physics v2.0
| Hrishikesh Somchatwar | industrial-control-systems-securityembedded-securityfirmware-analysis+3 |
| 2024-04-19 | Talk | Blackhat |
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | embedded-securityfirmware-analysisvulnerability-management+2 |
| 2023-08-10 | Talk | Defcon |
Hardware Backdooring an e-Scooter
| Arun Mane | reverse-engineeringindustrial-control-systems-securityvulnerability-management+2 |
| 2023-08-10 | Talk | Defcon |
Wheels of Wonder: Unveiling Car Hacking Poetry
| Hrishikesh Somchatwar | firmware-analysisreverse-engineeringautomotive-cybersecurity+1 |
| 2023-08-06 | Talk | C0c0n |
A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things
| Panchami V, Mahima Mary Mathews | authenticationprivacyembedded-security+1 |
| 2022-09-24 | Talk | C0c0n |
Introduction to RFID/NFC Hacking
| Davis Sojan | embedded-securityfirmware-analysishardware-security+3 |
| 2022-05-18 | Talk | Can Sec West |
Launching EMUX - A framework for emulating ARM and MIPS IoT Devices
| Saumil Shah | firmware-analysisreverse-engineeringembedded-security+1 |
| 2021-11-12 | Talk | C0c0n |
IoT Security Guidelines & Standards
| Yashodhan Vivek Mandke | embedded-securityiot-device-managementiot-security-testing+3 |
| 2020-10-02 | Talk | Blackhat |
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
| Aravind Machiry | embedded-systems |
| 2020-03-18 | Talk | Can Sec West |
The ARM-X Firmware Emulation Framework
| Saumil Shah | redteamarmfirmware+5 |
| 2019-12-04 | Talk | Blackhat |
Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing
| Karthik Ramasamy | blueteamsmartcard |
| 2019-11-09 | Talk | Toor Con |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria | reverse-engineeringhardware-reverse-engineeringvulnerability-management+3 |
| 2019-09-27 | Talk | C0c0n |
Defense in Depth for Embedded Systems
| Jiggyasu Sharma | embedded-systemsblueteam |
| 2019-08-09 | Talk | Defcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria | reverse-engineeringvulnerability-managementsecurity-architecture+2 |
| 2019-08-08 | Talk | Blackhat |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria | reverse-engineeringhardware/embedded |
| 2019-05-21 | Talk | Phdays |
How to fail in hardware hacking
| Arun Magesh | redteamhardware |
| 2019-05-21 | Talk | Phdays |
Rapid hardware hacking 101
| Arun Magesh | hardwareredteamiot |
| 2018-10-05 | Talk | C0c0n |
Cybersecurity Embedded Digital Transformation - The Future
| Sunil Kanchi | embedded-securitysecurity-architectureindustrial-control-systems-security |
| 2018-08-11 | Tool demo | Defcon |
HealthyPi—Connected Health
| Ashwin Whitchurch | healthcarehardwareopensource+1 |
| 2018-08-09 | Talk | Defcon |
Backdooring DVR/NVR devices
| Arun Mane | hardware-reverse-engineeringembedded-securitypentesting+3 |
| 2017-11-14 | Talk | Blackhat |
Pwning a Smart Home in Under 10 Minutes
| Aditya Gupta | iot-pentestingembedded-securitypentesting+3 |
| 2017-10-05 | Talk | Virus Bulletin |
The router of all evil: more than just default passwords and silly scripts
| Himanshu Anand | vulnerability-managementreverse-engineeringpentesting+1 |
| 2017-08-04 | Talk | Sha |
Attacking OpenSSL using Side-channel Attacks: The RSA case study
| Praveen Vadnala | reverse-engineeringvulnerability-managementsecurity-architecture+1 |
| 2017-07-27 | Talk | Defcon |
ICS Humla
| Sneha Rajguru, Arun Mane | ics-securityindustrial-control-systems-securitypentesting+2 |
| 2017-03-03 | Talk | Nullcon |
Case Study on RFID (proximity cards) hacking
| Sarwar Jahan, Ashwath Kumar | rfidredteaminfrastructure |
| 2016-11-05 | Talk | Hackfest |
LockPicker: Leaking data from live LUKS partition
| Adhokshaj Mishra | linuxredteamhardware |
| 2016-11-04 | Tool demo | Blackhat |
Firmware Analysis Toolkit (FAT)
| Aditya Gupta | firmwareanalysisiot+1 |
| 2016-08-05 | Talk | Defcon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria | reverse-engineeringhardware-reverse-engineeringfirmware-analysis+3 |
| 2016-06-18 | Talk | Recon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria | reverse-engineeringhardware-reverse-engineeringfirmware-analysis+3 |
| 2016-03-11 | Talk | Nullcon |
Physical Lock Security
| Amey Gat, Swapnil Wadwalkar | pentestingreverse-engineeringvulnerability-management+1 |
| 2016-03-11 | Talk | Nullcon |
Hitchhiker’s guide to hacking Industrial Control systems (ICS)
| Arun Mane | redteamicshid |
| 2015-11-12 | Tool demo | Blackhat |
Kautilya: Fastest shells you will ever get
| Nikhil Mittal | hidredteamshell+1 |
| 2015-11-05 | Talk | Ground Zero Summit |
Sanctioned to Hack: Your SCADA HMIs Belong to Us!
| Aditya K Sood | ics-securityweb-securityvulnerability-management+3 |
| 2015-11-05 | Talk | Ground Zero Summit |
Hacking RFIDs under 2000INR
| Jayesh Chauhan | rfidnetworkredteam |
| 2015-08-06 | Tool demo | Blackhat |
Kautilya
| Nikhil Mittal | hidredteamshell+1 |
| 2015-08-01 | Talk | C0c0n |
Hacking RFIDs under 2000 INR
| Jayesh Chauhan, Divya S John | rfidnetwork |
| 2014-02-14 | Talk | Nullcon |
Hardware Attack Vectors
| Yashin Mehaboobe | hardwareredteamhid+3 |
| 2013-11-07 | Talk | Ground Zero Summit |
Serial killing of embedded systems
| Atul Alex | embedded-systems |
| 2012-12-01 | Talk | Clubhack |
Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC
| Aditya Gupta, Subho Halder | mobilenfcnetwork+1 |
| 2012-03-16 | Talk | Blackhat |
The Pwnage Saga Continues
| Nikhil Mittal | hidredteamshell |
| 2011-12-15 | Talk | Blackhat |
Kautilya: Teensy Beyond Shell
| Nikhil Mittal | hidredteamshell |
| 2011-12-04 | Talk | Clubhack |
Mere paas Teensy hai
| Nikhil Mittal | hidredteamshell+1 |
| 2011-11-25 | Talk | Malcon |
Mareech : Look it’s a HID made up of gold
| Nikhil Mittal | hidredteammalware |
| 2011-11-04 | Talk | Hackfest |
Here are your keystrokes
| Nikhil Mittal | redteamkeyloggingpentest+2 |
| 2011-02-25 | Talk | Nullcon |
Penetration Testing a Biometric System
| Rahul Sasi | pentestbiometrichid+1 |
| 2009-04-22 | Talk | Hitb Sec Conf |
Pwnage 2.0
| Saumil Shah | hidredteamshell |