🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

🏭 Industrial Control Systems Security

Industrial control systems security and related activities

147
Contributors
99
Talks
20
Tool Demos
15
Panels
1
Awards

Top Contributors

Arun Mane(8) Amol Sarwate(7) Aseem Jakhar(6) Harshit Agrawal(6) Season Cherian(5)

Related Tags (15)

Show all 15 tags...

All Entries (135 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06TalkBlackhat Adversarial Fuzzer for Teleoperation Commands: Evaluating Autonomous Vehicle Resilience Presentation Video Shanit Gupta, Zhisheng Hu, Cooper De Nicola#automotive-cybersecurity#security-testing#control-systems
2025-04-04Tool demoBlackhat CompartIoT Source Code Sreesankar S, Aditya Krishna Vinod, Season Cherian#microcontrollers#hardware-embedded#firmware-analysis+2
2025-04-03Tool demoBlackhat CompartIoT Source Code Sreesankar S, Aditya Krishna Vinod, Season Cherian#microcontrollers#hardware-embedded#firmware-analysis+2
2025-04-03Tool demoBlackhat R0fuzz: A Collaborative Fuzzer Source Code Season Cherian, Anikait Panigrahi, Aparna Balaji#fuzzing#ics-security#industrial-control-systems+2
2025-03-02PanelNullcon Tackling Automotive Hardware Vulnerabilities Aseem Jakhar, Sachin Jain, Adam Laurie#automotive-cybersecurity#embedded-systems#hardware-embedded+3
2025-03-02TalkNullcon Satellite Communications: Analyzing and Protecting Space-Based Assets Video Drishti Jain#network-pentesting#ics-security#encryption+4
2025-03-01PanelNullcon Converging IT and OT Security: Unified strategies for protection, detection and response Burgess Cooper, Kuldeep Singh, Shailendra Fuloria, Rohit Sharma, Sachin Burman, Yask Sharma#ics-security#cloud-workload-protection#security-strategy+1
2024-12-12Tool demoBlackhat Genzai - The IoT Security Toolkit Source Code Umair Nehri#genzai#iot-device-management#iot-pentesting+4
2024-11-21TalkSecurityfest Wheels of Wonder Video Hrishikesh Somchatwar#automotive-cybersecurity#car-hacking#embedded-systems+4
2024-11-21TalkDeepsec Hacking with Physics v2.0 Hrishikesh Somchatwar#ics-security#embedded-security#firmware-analysis+2
2024-11-15TalkC0c0n Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate Video Kartik Lalan#automotive-cybersecurity#reverse-engineering#security-assessment+1
2024-11-15PanelC0c0n The Pager Attack: A Wake-Up Call for Global Cyber Defense Strategies Aseem Jakhar, M Nagarajan, Tarun Wig, Philip Varughese Vayarakunnil, Nikhil Shrivastava#cyber-warfare#critical-infrastructure#ics-security
2024-10-23Tool demoBlackhat R0fuzz: A Collaborative Fuzzer Source Code Season Cherian, Vishnu Dev, Vivek N J#fuzzing#ics-security#industrial-control-systems+1
2024-08-30TalkHitbsecconf Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles Presentation Video Ravi Rajput#web-security#security-assessment#exploitation+2
2024-08-10TalkDefcon Compromising an Electronic Logging Device and Creating a Truck2Truck Worm Presentation Rik Chatterjee, Jake Jepson#eld#embedded-systems#ics-security+3
2024-08-10PanelDefcon Color Blasted Badge Making: How Hard Could It Be ? Abhinav Panda, Hamster, Bradan Lane#hardware-embedded#embedded-systems#hardware-hacking
2024-08-08Tool demoBlackhat ICSGoat: A Damn Vulnerable ICS Infrastructure Source Code Shantanu Kale, Divya Nain#ics-security#scada#plc-security+2
2024-08-07TalkBlackhat The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition Presentation Arun Kanuparthi, Hareesh Khattri, Jeyavijayan Jv Rajendran, Jason Fung, Ahmad Reza Sadeghi#hacking#embedded-systems#ctf
2024-04-19Tool demoBlackhat GearGoat : Car Vulnerabilities Simulator Source Code Nishant Sharma, Pranjal Soni, Sanjeev Mahunta#car-hacking#iot-device-management#iot-pentesting+3
2024-04-19TalkBlackhat China’s Military Cyber Operations: Has the Strategic Support Force Come of Age? Presentation Pukhraj Singh#ics-security#risk-management#architecture
2024-04-19TalkBlackhat Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems Presentation Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay#embedded-security#firmware-analysis#architecture+1
2024-04-18TalkBlackhat The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition Presentation Arun Kanuparthi, Hareesh Khattri, Jeyavijayan Jv Rajendran, Jason Fung, Ahmad Reza Sadeghi#hacking#embedded-systems#ctf+1
2024-04-18Tool demoBlackhat R0fuzz Source Code Season Cherian, Vishnu Dev#fuzzing#ics-security#ics+2
2024-03-11TalkNullcon Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC Presentation Video Arpan Jati#vulnerability-assessment#embedded-systems#firmware-analysis
2024-03-11TalkNullcon Hacking Trains Presentation Jaden Furtado#hacking#ics-security#network-forensics+2
2023-09-24PanelNullcon C4CII - SECURING USE OF CLOUD IN CRITICAL INFORMATION INFRASTRUCTURE Saikat Datta, Akash Mahajan, Varun Singla, Navin Kumar Singh, Phil Rodrigues#cloud-security-posture-management#cloud-workload-protection#critical-infrastructure+3
2023-09-24PanelNullcon A CYBER-PHYSICAL SYSTEM FOR INDIA WITH SECURITY, PRIVACY, AND EQUITY Kunal Korgaonkar, Kapil Jaiswal, Malcolm Dsouza, Manoj Aggarwal, Niraj Sharma#cyber-physical-systems#security-strategy#data-protection+1
2023-09-23PanelNullcon CRITICAL INFORMATION INFRASTRUCTURE(CII) PROTECTION: CHALLENGES AND OPPORTUNITIES- HOW CAN THE NULLCON COMMUNITY CONTRIBUTE Video Saikat Datta, M v Sheshadri, Madhavi Purandare, Mathan Babu Kasilingam, Navin Kumar Singh#critical-infrastructure#cybersecurity-framework#security-strategy+4
2023-09-23TalkNullcon Journey in setting up OT SOC Presentation Ramandeep Singh Walia#soc#ics-security#threat-detection+1
2023-09-23PanelNullcon THREAT INTEL SHARING IN OT COMMUNITY AND INDUSTRY Ramandeep Singh Walia, Yask Sharma, Sanjeev Sharma, Britto Sidhan, Rohit Sharma#ics-security#cyber-war#intelligence-sharing+3
2023-08-24TalkHitbsecconf Hardware Backdooring an eScooter Video Arun Mane#reverse-engineering#ics-security#automotive-cybersecurity
2023-08-10TalkDefcon Attacking Vehicle Fleet Management Systems Presentation Video Yashin Mehaboobe#automotive-cybersecurity#ics-security#embedded-systems+4
2023-08-10TalkDefcamp Hardware Backdooring an e-Scooter Video Arun Mane#reverse-engineering#ics-security#automotive-cybersecurity
2023-08-10TalkDefcon Wheels of Wonder: Unveiling Car Hacking Poetry Presentation Video Hrishikesh Somchatwar#firmware-analysis#reverse-engineering#automotive-cybersecurity
2023-08-07TalkC0c0n Exploring Threats in Operational Technology Manjunath Hiregange#ics-security#operational-technology#threat-hunting+1
2023-08-07TalkC0c0n Trust Resiliency - A Lesson Learned from Russia Ukraine War Video Ajit Hatti#incident-management#architecture#risk-management+1
2023-05-12Tool demoBlackhat Introducing the Operating System for Automotive Security Testing: A Hands-on Demonstration Source Code Ravi Rajput#automobile#automotive-cybersecurity#embedded-systems+4
2023-05-11Tool demoBlackhat CANalyse 2.0 : A Vehicle Network Analysis and Attack Tool Source Code Kartheek Lade#automobile#car-hacking#iot-device-management+4
2022-12-08Tool demoBlackhat Industrial Control Systems: Capture the Train! Dhruv Sharan, Arnaud Soullié#ctf#ics-security#plc-security+3
2022-09-28TalkRootcon Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations Harshit Agrawal#ics-security#architecture#risk-management
2022-09-24TalkC0c0n CANalyse: A Vehicle Network Analysis and Attack Tool Kartheek Lade#network-pentesting#network-traffic-analysis#can-bus+1
2022-09-23TalkC0c0n Cybersecurity for Manufacturing Santhosh Srinivasan#ics-security#control-systems#critical-infrastructure+2
2022-09-07TalkNullcon Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls Presentation Video Shyam Sundar Ramaswami, Rakesh Mahanthi#vulnerability-assessment#hmi#data-protection+1
2022-09-06PanelNullcon IoT Supply Chain Blues and the way forward Video Aseem Jakhar, Kedar Sovani, Anantharaman Iyer, Suvabrata Sinha, Sudarshan Rajagopal, Sachin Jain#iot-device-management#iot-pentesting#supply-chain-security+3
2022-08-14TalkDefcon Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right Vivek Ponnada#ics-security#risk-management#architecture+1
2022-08-11TalkBlackhat RollBack - A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems Presentation Whitepaper Soundarya Ramesh, Levente Csikor, Hoon Wei Lim, Jun Wen Wong, Rohini Poolat Parameswarath, Chan Mun Choon#automobile#automotive-cybersecurity#car-hacking+2
2022-08-10Tool demoBlackhat CANalyse (2.0): A vehicle network analysis and attack tool Source Code Kartheek Lade, Rahul Jeyasingh#automobile#car-hacking#iot-device-management+4
2022-05-12TalkBlackhat Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems Presentation Prashant Rajput, Michail Maniatakos#ics-security#control-systems#hardware-embedded+3
2021-11-19TalkHackfest Hacking with Physics Hrishikesh Somchatwar#ics-security#automotive-cybersecurity#embedded-systems+4
2021-11-13TalkC0c0n Securing OT in O&G Industry George Eapen#ics-security#control-systems#critical-infrastructure
2021-11-13TalkC0c0n A look into cyber-espionage activities targeting critical infrastructure in India Saurabh Sharma, Kurt Baumgartner#ics-security#critical-infrastructure#threat-hunting+1
2021-11-13TalkC0c0n Cyber Warfare & Securing Critical Infrastructures Faruk Kazi#critical-infrastructure#ics-security#incident-management+1
2021-11-12TalkC0c0n ICS Security —- A need, a challenge and a new change in Mindset Dhruv Gupta#ics-security#critical-infrastructure#control-systems+1
2021-11-10Tool demoBlackhat RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot Source Code Abhimanyu Rawat, Shreyas Srinivasa, Emmanouil Vasilomanolakis#blueteam#honeypot#network-defense+1
2021-10-13TalkRootcon The Kill Chain: Future of Cyber in Defense Video Harshit Agrawal#architecture#ics-security#risk-management
2021-09-07TalkConfidence Swapping Asprin formulas with MDMA while Red Teaming a Billion Dollar Pharmaceutical Aman Sachdev, Himanshu Sharma#red-teaming#ethical-hacking#security-assessment+2
2021-08-26TalkHitbsecconf Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade Presentation Video Harshit Agrawal#ics-security#architecture#risk-management
2021-08-08TalkDefcon Top 20 Secure PLC Coding Practices Video Vivek Ponnada, Sarah Fluchs#ics-security#secure-coding#control-systems+1
2021-08-06TalkDefcon Defending IoT in the Future of High-Tech Warfare Video Harshit Agrawal#iot-pentesting#architecture#ics-security
2021-08-04Tool demoBlackhat Automated Attack Path Planning and Validation (A2P2V) Source Code Subir Das, Fukutomo Nakanishi, Jason Youzwak, Michael Hylkema, Santoshi Aoki#ethical-hacking#exploitation#cyber-physical-systems
2021-05-07Tool demoBlackhat CANalyse: A Vehicle Network Analysis and Attack Tool Source Code Kartheek Lade#automobile#car-hacking#iot-device-management+4
2021-03-05PanelNullcon CyberPhysical Systems Security - Trends, challenges & opportunities Video Frank Sanjay, Khushwant Pawar, Mayur Mehta, Faruk Kazi#industrial-control-systems#operational-technology#embedded-systems+3
2021-03-05TalkNullcon Arbitrary code execution on RISC-V using fault injection Video Praveen Vadnala, Nils Wiersma#code-analysis#hardware-embedded#embedded-systems+1
2020-10-07TalkRootcon Blockchain Based OT Monitoring Solution (BBOTMS) Presentation Video Asif Hameed Khan, Gagan Jattana#ics#blueteam#decentralized-systems+4
2020-10-07TalkRootcon How I Pwned the ICS data during my internship Presentation Shail Patel#ics#red-teaming#ics-security+1
2020-10-02TalkBlackhat Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale Presentation Whitepaper Video Aravind Machiry, Nilo Redini, Andrea Continella, Ruoyu Wang, Yan Shoshitaishvili, Cristopher Kruegel, Giovanni Vigna, Chad Spensky#embedded-systems#firmware-analysis#static-analysis+1
2020-09-18TalkC0c0n All about IOT Forensics Hima Bindu Vejella#forensics#iot-device-management#iot-pentesting+4
2020-09-18TalkC0c0n Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Video Kaustubh Padwad#red-teaming#security-assessment#iot-device-management+4
2020-09-18TalkC0c0n Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux Munawwar Hussain Shelia#reverse-engineering#firmware-analysis#embedded-systems+4
2020-04-24TalkHitbsecconf COMMSEC: The State of ICS Security : Then and Now Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot#scada#blueteam#security-assessment
2020-03-07PanelNullcon Supply Chain Security In Critical Infrastructure Systems Video Manish Tiwari, Suchit Mishra, Faruk Kazi, Cristofaro Mune#supply-chain-attack#supply-chain-security#critical-infrastructure+3
2019-10-16Tool demoHitbsecconf Introducing ARM-X - The ARM IoT Firmware Emulation Framework Presentation Source Code Video Saumil Shah#arm#linux#firmware-analysis+4
2019-09-27TalkC0c0n Defense in Depth for Embedded Systems Presentation Jiggyasu Sharma#embedded-systems#blueteam#hardware-embedded+4
2019-09-27TalkC0c0n Hacking ICS devices for Fun Arun Mane#red-teaming#ics-security#exploit-delivery+1
2019-09-27TalkC0c0n Industry 4.0 - Security and Compliance Santhosh Srinivasan#ics-security#security-compliance#security-governance+2
2019-09-27TalkC0c0n Looking a decade ahead: Big data, drones , Robots and cyber security. Rahul Sasi#ics-security#architecture#ai-security+2
2019-09-23TalkRootcon Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking Video Arun Mane#red-teaming#ics#ics-security+3
2019-08-09Award Thrangrycat - Pwnie Award for Most Under-Hyped Research Source Code Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#firmware-analysis+2
2019-08-08TalkDefcon Hacking ICS devices for Fun Penetration Testing of Vehicle Components Video Arun Mane#automotive-cybersecurity#can-bus#ics-security+2
2019-08-08TalkBlackhat 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Presentation Video Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#exploit-delivery+3
2019-05-28TalkSecurityfest RF Exploitation: Demystifying IoT/OT hacks with SDR Video Himanshu Mehta, Harshit Agrawal#rf#iot-pentesting#operational-technology+1
2019-05-21TalkPhdays How to fail in hardware hacking Presentation Arun Magesh#red-teaming#embedded-systems#firmware-analysis+1
2019-05-21TalkPhdays Rapid hardware hacking 101 Arun Magesh#red-teaming#iot-pentesting#hardware-embedded+2
2019-05-10TalkHitbsecconf HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR Presentation Video Himanshu Mehta, Harshit Agrawal#rf#red-teaming#hardware-embedded+3
2019-05-09TalkHitbsecconf Make ARM Shellcode Great Again Presentation Video Saumil Shah#arm#embedded-systems#firmware-analysis+1
2019-03-02PanelNullcon CISO Strategy for OT and IoT risk and Threat Management Video Gaurav Shukla, Gomeet Pant, Rakesh Viswanathan, Sudarshan Rajagopal#ics-security#iot-pentesting#cybersecurity-strategy+3
2019-03-01PanelNullcon Clear and Present Danger: Cyber Wars will Target Critical Infrastructure Video Sourabh Issar, Sachin Burman, Sudarshan Rajagopal, Somenath Kundu#cyber-war#critical-infrastructure#security-strategy+1
2018-10-15TalkHacklu Make ARM Shellcode Great Again Presentation Saumil Shah#arm#embedded-systems#firmware-analysis
2018-10-05TalkC0c0n Future of Mobility & Cyber Security Suja Chandy#automotive-cybersecurity#ics-security#architecture+2
2018-10-05TalkC0c0n Cybersecurity Embedded Digital Transformation - The Future Sunil Kanchi#embedded-security#architecture#ics-security
2018-09-27TalkRootcon Expl-iot: Hacking IoT like a boss Presentation Video Aseem Jakhar#red-teaming#iot-security-testing#firmware-analysis+2
2018-09-12Talk44con Make ARM Shellcode Great Again Presentation Video Saumil Shah#arm#embedded-systems#security-tools+3
2018-08-11Tool demoDefcon HealthyPi—Connected Health Source Code Ashwin Whitchurch#raspberry-pi#hardware-embedded#embedded-systems+4
2018-08-08Tool demoBlackhat DARWIN: Real World Use Cases for Covert Wireless Arun Mane, Rushikesh D Nandedkar#wifi#ieee802.15.4#embedded-systems
2018-03-03PanelNullcon IoT : How long till D Day? Video Aseem Jakhar, Shobha Jagathpal, Rishikesh Kamat, Daniel Cisowski, Michael Pyle#iot-device-management#iot-pentesting#embedded-systems+3
2017-08-18TalkC0c0n Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure Manas Pratim Sarma#blueteam#critical-infrastructure#cybersecurity-strategy+2
2017-08-18TalkC0c0n CoAP versus MQTT: IoT Protocol Vulnerability analysis Rajiv Pandey#security-assessment#iot-pentesting#embedded-systems+1
2017-08-18TalkC0c0n Hacking Homes: A hardware insight for IoT [in]Security Jiggyasu Sharma#red-teaming#hardware-embedded#firmware-analysis+2
2017-08-18TalkC0c0n The Internet Of Things: Essentials of Secur(IOT)y Arpit Bajpai, Ronald Michael#blueteam#iot-device-management#iot-pentesting+4
2017-07-27TalkDefcon ICS Humla Presentation Video Sneha Rajguru, Arun Mane#ics-security#security-assessment#embedded-systems+4
2017-04-14TalkHitbsecconf Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure Presentation Video Anirudh Duggal#red-teaming#application-pentesting#data-protection+3
2017-03-03TalkNullcon Securing Critical National Infrastructure Video Shailendra Fuloria, R Sarangapani, Rahul Tongia, Michael Pyle, Justin Searle#critical-infrastructure#ics-security#risk-management+3
2017-03-03TalkNullcon Case Study on RFID (proximity cards) hacking Presentation Sarwar Jahan, Ashwath Kumar#rfid#red-teaming#hardware-embedded+4
2017-03-03PanelNullcon Hardware Security: Foundational Block of Cyber Battlefield Vinayak Godse, Amit Sharma, Aseem Jakhar, Minatee Mishra#hardware-embedded#firmware-analysis#embedded-systems+4
2016-11-04Tool demoBlackhat Firmware Analysis Toolkit (FAT) Source Code Aditya Gupta#firmware#security-assessment#embedded-systems+3
2016-08-19TalkC0c0n Attacking and crashing IOT devices via Bluetooth LE Protocol Presentation Pratap Chandra Allena, Ajay Pratap Singh#bluetooth#red-teaming#iot-pentesting+2
2016-08-04TalkBlackhat Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages Video Anirudh Duggal#ics-security#risk-management#application-pentesting+3
2016-03-11TalkNullcon Hitchhiker’s guide to hacking Industrial Control systems (ICS) Arun Mane#red-teaming#ics#hid
2015-11-05TalkGroundzerosummit Hacking RFIDs under 2000INR Jayesh Chauhan#rfid#red-teaming#hardware-embedded+4
2015-11-05TalkGroundzerosummit Cyber Security in Hospitals:Hospitals Under Seige Anirudh Duggal#hl7#data-protection#incident-management
2015-11-05TalkGroundzerosummit Sanctioned to Hack: Your SCADA HMIs Belong to Us! Aditya K Sood#ics-security#web-security#firmware-analysis+2
2015-09-25TalkAppsecusa The State of Web Application Security in SCADA Web Human Machine Interfaces (HMIs)! Aditya K Sood#scada#hmi#web-security+1
2015-08-08TalkDefcon Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Video Aditya K Sood#scada#hmi#security-assessment+4
2015-08-01TalkC0c0n From AOSP ( Android OpenSource Project ) to ABD ( Android Based Devices ) Anto Joseph#android#mobile-device-management#embedded-systems+2
2015-08-01TalkC0c0n Hacking RFIDs under 2000 INR Jayesh Chauhan, Divya S John#rfid#hardware-embedded#embedded-systems+3
2014-11-13TalkGroundzerosummit Hacking consumer electronics for Fun Atul Alex#red-teaming#embedded-systems#firmware-analysis+1
2014-11-13TalkGroundzerosummit SCADA Exploitation through Firmware Ashish Saxena#red-teaming#firmware-analysis#ics-security+3
2014-08-07Tool demoBlackhat C-SCAD: Assessing Security flaws in clearscada Web_X client! Presentation Source Code Aditya K Sood#red-teaming#security-assessment#ics-security+3
2014-03-18TalkTroopers Evolution of SIM Card Security Presentation Ravishankar Borgaonkar#3gpp#gsma#embedded-systems+4
2014-02-14TalkNullcon 2014 The year in which we cannot ignore SCADA Presentation Video Amol Sarwate#scada#blueteam#ics-security+4
2014-02-14TalkNullcon Null Hardware Badge 101 (Desi Jugaad) Presentation Video Amey Gat, Umesh#microcontrollers#embedded-systems#hardware-embedded
2013-11-21TalkDeepsec Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy Video Parth Shukla#botnet#telnet#network-architecture+3
2013-11-20TalkAppsecusa Why is SCADA Security an Uphill Battle? Video Amol Sarwate#scada#application-pentesting#application-hardening+4
2013-11-07TalkGroundzerosummit Serial killing of embedded systems Atul Alex#embedded-systems#hardware-embedded#firmware-analysis+1
2013-03-15TalkBlackhat Vulnerability analysis of 2013 SCADA issues Presentation Video Amol Sarwate#scada#ics-security#attack-surface+2
2012-12-01TalkClubhack Smart Grid Security Presentation Video Falgun Rathod#blueteam#critical-infrastructure#cyber-physical-systems+2
2012-11-23TalkMalcon Tampering in Energy Meters Presentation Mohit Arora#energy-theft#embedded-systems#firmware-analysis+2
2012-03-15TalkHackinparis SCADA Security: Why Is It So Hard ? Video Amol Sarwate#ics-security#scada#control-systems+2
2012-03-15TalkGrrcon SCADA Security: Why is it so hard? Video Amol Sarwate#scada#ics-security#authentication+2
2012-02-15TalkNullcon SCADA Security: Why is it so hard Amol Sarwate#scada#ics-security#control-systems+1
2012-02-15TalkNullcon Open source revolution :Need Hardware - Software marriage Venkatesh#embedded-systems#hardware-embedded#open-source-security
2012-02-15TalkNullcon Teensy for fun and jugaad Amey Gat#microcontrollers#embedded-systems#hid
2011-12-14TalkBlackhat SCADA Security - Why Is It So Hard? Presentation Whitepaper Source Code Amol Sarwate#scada#ics-security#control-systems+1
2011-08-03TalkBlackhat Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS Presentation Whitepaper Video Jatin Kataria, Ang Cui, Salvatore Stolfo#cisco-ios#hardware-embedded#firmware-analysis+4
2009-12-05TalkClubhack Indian IT Act 2000 vs 2009 Presentation Rohas Nagpal#cyber-law#embedded-systems#firmware-analysis+4