| 2025-08-06 | Talk | Blackhat |
Adversarial Fuzzer for Teleoperation Commands: Evaluating Autonomous Vehicle Resilience
| Shanit Gupta, Zhisheng Hu, Cooper De Nicola | #automotive-cybersecurity#security-testing#control-systems |
| 2025-04-04 | Tool demo | Blackhat |
CompartIoT
| Sreesankar S, Aditya Krishna Vinod, Season Cherian | #microcontrollers#hardware-embedded#firmware-analysis+2 |
| 2025-04-03 | Tool demo | Blackhat |
CompartIoT
| Sreesankar S, Aditya Krishna Vinod, Season Cherian | #microcontrollers#hardware-embedded#firmware-analysis+2 |
| 2025-04-03 | Tool demo | Blackhat |
R0fuzz: A Collaborative Fuzzer
| Season Cherian, Anikait Panigrahi, Aparna Balaji | #fuzzing#ics-security#industrial-control-systems+2 |
| 2025-03-02 | Panel | Nullcon |
Tackling Automotive Hardware Vulnerabilities
| Aseem Jakhar, Sachin Jain, Adam Laurie | #automotive-cybersecurity#embedded-systems#hardware-embedded+3 |
| 2025-03-02 | Talk | Nullcon |
Satellite Communications: Analyzing and Protecting Space-Based Assets
| Drishti Jain | #network-pentesting#ics-security#encryption+4 |
| 2025-03-01 | Panel | Nullcon |
Converging IT and OT Security: Unified strategies for protection, detection and response
| Burgess Cooper, Kuldeep Singh, Shailendra Fuloria, Rohit Sharma, Sachin Burman, Yask Sharma | #ics-security#cloud-workload-protection#security-strategy+1 |
| 2024-12-12 | Tool demo | Blackhat |
Genzai - The IoT Security Toolkit
| Umair Nehri | #genzai#iot-device-management#iot-pentesting+4 |
| 2024-11-21 | Talk | Securityfest |
Wheels of Wonder
| Hrishikesh Somchatwar | #automotive-cybersecurity#car-hacking#embedded-systems+4 |
| 2024-11-21 | Talk | Deepsec |
Hacking with Physics v2.0
| Hrishikesh Somchatwar | #ics-security#embedded-security#firmware-analysis+2 |
| 2024-11-15 | Talk | C0c0n |
Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate
| Kartik Lalan | #automotive-cybersecurity#reverse-engineering#security-assessment+1 |
| 2024-11-15 | Panel | C0c0n |
The Pager Attack: A Wake-Up Call for Global Cyber Defense Strategies
| Aseem Jakhar, M Nagarajan, Tarun Wig, Philip Varughese Vayarakunnil, Nikhil Shrivastava | #cyber-warfare#critical-infrastructure#ics-security |
| 2024-10-23 | Tool demo | Blackhat |
R0fuzz: A Collaborative Fuzzer
| Season Cherian, Vishnu Dev, Vivek N J | #fuzzing#ics-security#industrial-control-systems+1 |
| 2024-08-30 | Talk | Hitbsecconf |
Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles
| Ravi Rajput | #web-security#security-assessment#exploitation+2 |
| 2024-08-10 | Talk | Defcon |
Compromising an Electronic Logging Device and Creating a Truck2Truck Worm
| Rik Chatterjee, Jake Jepson | #eld#embedded-systems#ics-security+3 |
| 2024-08-10 | Panel | Defcon |
Color Blasted Badge Making: How Hard Could It Be ?
| Abhinav Panda, Hamster, Bradan Lane | #hardware-embedded#embedded-systems#hardware-hacking |
| 2024-08-08 | Tool demo | Blackhat |
ICSGoat: A Damn Vulnerable ICS Infrastructure
| Shantanu Kale, Divya Nain | #ics-security#scada#plc-security+2 |
| 2024-08-07 | Talk | Blackhat |
The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition
| Arun Kanuparthi, Hareesh Khattri, Jeyavijayan Jv Rajendran, Jason Fung, Ahmad Reza Sadeghi | #hacking#embedded-systems#ctf |
| 2024-04-19 | Tool demo | Blackhat |
GearGoat : Car Vulnerabilities Simulator
| Nishant Sharma, Pranjal Soni, Sanjeev Mahunta | #car-hacking#iot-device-management#iot-pentesting+3 |
| 2024-04-19 | Talk | Blackhat |
China’s Military Cyber Operations: Has the Strategic Support Force Come of Age?
| Pukhraj Singh | #ics-security#risk-management#architecture |
| 2024-04-19 | Talk | Blackhat |
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | #embedded-security#firmware-analysis#architecture+1 |
| 2024-04-18 | Talk | Blackhat |
The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition
| Arun Kanuparthi, Hareesh Khattri, Jeyavijayan Jv Rajendran, Jason Fung, Ahmad Reza Sadeghi | #hacking#embedded-systems#ctf+1 |
| 2024-04-18 | Tool demo | Blackhat |
R0fuzz
| Season Cherian, Vishnu Dev | #fuzzing#ics-security#ics+2 |
| 2024-03-11 | Talk | Nullcon |
Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC
| Arpan Jati | #vulnerability-assessment#embedded-systems#firmware-analysis |
| 2024-03-11 | Talk | Nullcon |
Hacking Trains
| Jaden Furtado | #hacking#ics-security#network-forensics+2 |
| 2023-09-24 | Panel | Nullcon |
C4CII - SECURING USE OF CLOUD IN CRITICAL INFORMATION INFRASTRUCTURE
| Saikat Datta, Akash Mahajan, Varun Singla, Navin Kumar Singh, Phil Rodrigues | #cloud-security-posture-management#cloud-workload-protection#critical-infrastructure+3 |
| 2023-09-24 | Panel | Nullcon |
A CYBER-PHYSICAL SYSTEM FOR INDIA WITH SECURITY, PRIVACY, AND EQUITY
| Kunal Korgaonkar, Kapil Jaiswal, Malcolm Dsouza, Manoj Aggarwal, Niraj Sharma | #cyber-physical-systems#security-strategy#data-protection+1 |
| 2023-09-23 | Panel | Nullcon |
CRITICAL INFORMATION INFRASTRUCTURE(CII) PROTECTION: CHALLENGES AND OPPORTUNITIES- HOW CAN THE NULLCON COMMUNITY CONTRIBUTE
| Saikat Datta, M v Sheshadri, Madhavi Purandare, Mathan Babu Kasilingam, Navin Kumar Singh | #critical-infrastructure#cybersecurity-framework#security-strategy+4 |
| 2023-09-23 | Talk | Nullcon |
Journey in setting up OT SOC
| Ramandeep Singh Walia | #soc#ics-security#threat-detection+1 |
| 2023-09-23 | Panel | Nullcon |
THREAT INTEL SHARING IN OT COMMUNITY AND INDUSTRY
| Ramandeep Singh Walia, Yask Sharma, Sanjeev Sharma, Britto Sidhan, Rohit Sharma | #ics-security#cyber-war#intelligence-sharing+3 |
| 2023-08-24 | Talk | Hitbsecconf |
Hardware Backdooring an eScooter
| Arun Mane | #reverse-engineering#ics-security#automotive-cybersecurity |
| 2023-08-10 | Talk | Defcon |
Attacking Vehicle Fleet Management Systems
| Yashin Mehaboobe | #automotive-cybersecurity#ics-security#embedded-systems+4 |
| 2023-08-10 | Talk | Defcamp |
Hardware Backdooring an e-Scooter
| Arun Mane | #reverse-engineering#ics-security#automotive-cybersecurity |
| 2023-08-10 | Talk | Defcon |
Wheels of Wonder: Unveiling Car Hacking Poetry
| Hrishikesh Somchatwar | #firmware-analysis#reverse-engineering#automotive-cybersecurity |
| 2023-08-07 | Talk | C0c0n |
Exploring Threats in Operational Technology
| Manjunath Hiregange | #ics-security#operational-technology#threat-hunting+1 |
| 2023-08-07 | Talk | C0c0n |
Trust Resiliency - A Lesson Learned from Russia Ukraine War
| Ajit Hatti | #incident-management#architecture#risk-management+1 |
| 2023-05-12 | Tool demo | Blackhat |
Introducing the Operating System for Automotive Security Testing: A Hands-on Demonstration
| Ravi Rajput | #automobile#automotive-cybersecurity#embedded-systems+4 |
| 2023-05-11 | Tool demo | Blackhat |
CANalyse 2.0 : A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | #automobile#car-hacking#iot-device-management+4 |
| 2022-12-08 | Tool demo | Blackhat |
Industrial Control Systems: Capture the Train!
| Dhruv Sharan, Arnaud Soullié | #ctf#ics-security#plc-security+3 |
| 2022-09-28 | Talk | Rootcon |
Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations
| Harshit Agrawal | #ics-security#architecture#risk-management |
| 2022-09-24 | Talk | C0c0n |
CANalyse: A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | #network-pentesting#network-traffic-analysis#can-bus+1 |
| 2022-09-23 | Talk | C0c0n |
Cybersecurity for Manufacturing
| Santhosh Srinivasan | #ics-security#control-systems#critical-infrastructure+2 |
| 2022-09-07 | Talk | Nullcon |
Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls
| Shyam Sundar Ramaswami, Rakesh Mahanthi | #vulnerability-assessment#hmi#data-protection+1 |
| 2022-09-06 | Panel | Nullcon |
IoT Supply Chain Blues and the way forward
| Aseem Jakhar, Kedar Sovani, Anantharaman Iyer, Suvabrata Sinha, Sudarshan Rajagopal, Sachin Jain | #iot-device-management#iot-pentesting#supply-chain-security+3 |
| 2022-08-14 | Talk | Defcon |
Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right
| Vivek Ponnada | #ics-security#risk-management#architecture+1 |
| 2022-08-11 | Talk | Blackhat |
RollBack - A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems
| Soundarya Ramesh, Levente Csikor, Hoon Wei Lim, Jun Wen Wong, Rohini Poolat Parameswarath, Chan Mun Choon | #automobile#automotive-cybersecurity#car-hacking+2 |
| 2022-08-10 | Tool demo | Blackhat |
CANalyse (2.0): A vehicle network analysis and attack tool
| Kartheek Lade, Rahul Jeyasingh | #automobile#car-hacking#iot-device-management+4 |
| 2022-05-12 | Talk | Blackhat |
Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems
| Prashant Rajput, Michail Maniatakos | #ics-security#control-systems#hardware-embedded+3 |
| 2021-11-19 | Talk | Hackfest |
Hacking with Physics
| Hrishikesh Somchatwar | #ics-security#automotive-cybersecurity#embedded-systems+4 |
| 2021-11-13 | Talk | C0c0n |
Securing OT in O&G Industry
| George Eapen | #ics-security#control-systems#critical-infrastructure |
| 2021-11-13 | Talk | C0c0n |
A look into cyber-espionage activities targeting critical infrastructure in India
| Saurabh Sharma, Kurt Baumgartner | #ics-security#critical-infrastructure#threat-hunting+1 |
| 2021-11-13 | Talk | C0c0n |
Cyber Warfare & Securing Critical Infrastructures
| Faruk Kazi | #critical-infrastructure#ics-security#incident-management+1 |
| 2021-11-12 | Talk | C0c0n |
ICS Security —- A need, a challenge and a new change in Mindset
| Dhruv Gupta | #ics-security#critical-infrastructure#control-systems+1 |
| 2021-11-10 | Tool demo | Blackhat |
RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot
| Abhimanyu Rawat, Shreyas Srinivasa, Emmanouil Vasilomanolakis | #blueteam#honeypot#network-defense+1 |
| 2021-10-13 | Talk | Rootcon |
The Kill Chain: Future of Cyber in Defense
| Harshit Agrawal | #architecture#ics-security#risk-management |
| 2021-09-07 | Talk | Confidence |
Swapping Asprin formulas with MDMA while Red Teaming a Billion Dollar Pharmaceutical
| Aman Sachdev, Himanshu Sharma | #red-teaming#ethical-hacking#security-assessment+2 |
| 2021-08-26 | Talk | Hitbsecconf |
Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade
| Harshit Agrawal | #ics-security#architecture#risk-management |
| 2021-08-08 | Talk | Defcon |
Top 20 Secure PLC Coding Practices
| Vivek Ponnada, Sarah Fluchs | #ics-security#secure-coding#control-systems+1 |
| 2021-08-06 | Talk | Defcon |
Defending IoT in the Future of High-Tech Warfare
| Harshit Agrawal | #iot-pentesting#architecture#ics-security |
| 2021-08-04 | Tool demo | Blackhat |
Automated Attack Path Planning and Validation (A2P2V)
| Subir Das, Fukutomo Nakanishi, Jason Youzwak, Michael Hylkema, Santoshi Aoki | #ethical-hacking#exploitation#cyber-physical-systems |
| 2021-05-07 | Tool demo | Blackhat |
CANalyse: A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | #automobile#car-hacking#iot-device-management+4 |
| 2021-03-05 | Panel | Nullcon |
CyberPhysical Systems Security - Trends, challenges & opportunities
| Frank Sanjay, Khushwant Pawar, Mayur Mehta, Faruk Kazi | #industrial-control-systems#operational-technology#embedded-systems+3 |
| 2021-03-05 | Talk | Nullcon |
Arbitrary code execution on RISC-V using fault injection
| Praveen Vadnala, Nils Wiersma | #code-analysis#hardware-embedded#embedded-systems+1 |
| 2020-10-07 | Talk | Rootcon |
Blockchain Based OT Monitoring Solution (BBOTMS)
| Asif Hameed Khan, Gagan Jattana | #ics#blueteam#decentralized-systems+4 |
| 2020-10-07 | Talk | Rootcon |
How I Pwned the ICS data during my internship
| Shail Patel | #ics#red-teaming#ics-security+1 |
| 2020-10-02 | Talk | Blackhat |
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
| Aravind Machiry, Nilo Redini, Andrea Continella, Ruoyu Wang, Yan Shoshitaishvili, Cristopher Kruegel, Giovanni Vigna, Chad Spensky | #embedded-systems#firmware-analysis#static-analysis+1 |
| 2020-09-18 | Talk | C0c0n |
All about IOT Forensics
| Hima Bindu Vejella | #forensics#iot-device-management#iot-pentesting+4 |
| 2020-09-18 | Talk | C0c0n |
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing
| Kaustubh Padwad | #red-teaming#security-assessment#iot-device-management+4 |
| 2020-09-18 | Talk | C0c0n |
Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux
| Munawwar Hussain Shelia | #reverse-engineering#firmware-analysis#embedded-systems+4 |
| 2020-04-24 | Talk | Hitbsecconf |
COMMSEC: The State of ICS Security : Then and Now
| Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot | #scada#blueteam#security-assessment |
| 2020-03-07 | Panel | Nullcon |
Supply Chain Security In Critical Infrastructure Systems
| Manish Tiwari, Suchit Mishra, Faruk Kazi, Cristofaro Mune | #supply-chain-attack#supply-chain-security#critical-infrastructure+3 |
| 2019-10-16 | Tool demo | Hitbsecconf |
Introducing ARM-X - The ARM IoT Firmware Emulation Framework
| Saumil Shah | #arm#linux#firmware-analysis+4 |
| 2019-09-27 | Talk | C0c0n |
Defense in Depth for Embedded Systems
| Jiggyasu Sharma | #embedded-systems#blueteam#hardware-embedded+4 |
| 2019-09-27 | Talk | C0c0n |
Hacking ICS devices for Fun
| Arun Mane | #red-teaming#ics-security#exploit-delivery+1 |
| 2019-09-27 | Talk | C0c0n |
Industry 4.0 - Security and Compliance
| Santhosh Srinivasan | #ics-security#security-compliance#security-governance+2 |
| 2019-09-27 | Talk | C0c0n |
Looking a decade ahead: Big data, drones , Robots and cyber security.
| Rahul Sasi | #ics-security#architecture#ai-security+2 |
| 2019-09-23 | Talk | Rootcon |
Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking
| Arun Mane | #red-teaming#ics#ics-security+3 |
| 2019-08-09 | Award | |
Thrangrycat - Pwnie Award for Most Under-Hyped Research
| Jatin Kataria, Richard Housley, Ang Cui | #reverse-engineering#hardware-embedded#firmware-analysis+2 |
| 2019-08-08 | Talk | Defcon |
Hacking ICS devices for Fun Penetration Testing of Vehicle Components
| Arun Mane | #automotive-cybersecurity#can-bus#ics-security+2 |
| 2019-08-08 | Talk | Blackhat |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Richard Housley, Ang Cui | #reverse-engineering#hardware-embedded#exploit-delivery+3 |
| 2019-05-28 | Talk | Securityfest |
RF Exploitation: Demystifying IoT/OT hacks with SDR
| Himanshu Mehta, Harshit Agrawal | #rf#iot-pentesting#operational-technology+1 |
| 2019-05-21 | Talk | Phdays |
How to fail in hardware hacking
| Arun Magesh | #red-teaming#embedded-systems#firmware-analysis+1 |
| 2019-05-21 | Talk | Phdays |
Rapid hardware hacking 101
| Arun Magesh | #red-teaming#iot-pentesting#hardware-embedded+2 |
| 2019-05-10 | Talk | Hitbsecconf |
HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR
| Himanshu Mehta, Harshit Agrawal | #rf#red-teaming#hardware-embedded+3 |
| 2019-05-09 | Talk | Hitbsecconf |
Make ARM Shellcode Great Again
| Saumil Shah | #arm#embedded-systems#firmware-analysis+1 |
| 2019-03-02 | Panel | Nullcon |
CISO Strategy for OT and IoT risk and Threat Management
| Gaurav Shukla, Gomeet Pant, Rakesh Viswanathan, Sudarshan Rajagopal | #ics-security#iot-pentesting#cybersecurity-strategy+3 |
| 2019-03-01 | Panel | Nullcon |
Clear and Present Danger: Cyber Wars will Target Critical Infrastructure
| Sourabh Issar, Sachin Burman, Sudarshan Rajagopal, Somenath Kundu | #cyber-war#critical-infrastructure#security-strategy+1 |
| 2018-10-15 | Talk | Hacklu |
Make ARM Shellcode Great Again
| Saumil Shah | #arm#embedded-systems#firmware-analysis |
| 2018-10-05 | Talk | C0c0n |
Future of Mobility & Cyber Security
| Suja Chandy | #automotive-cybersecurity#ics-security#architecture+2 |
| 2018-10-05 | Talk | C0c0n |
Cybersecurity Embedded Digital Transformation - The Future
| Sunil Kanchi | #embedded-security#architecture#ics-security |
| 2018-09-27 | Talk | Rootcon |
Expl-iot: Hacking IoT like a boss
| Aseem Jakhar | #red-teaming#iot-security-testing#firmware-analysis+2 |
| 2018-09-12 | Talk | 44con |
Make ARM Shellcode Great Again
| Saumil Shah | #arm#embedded-systems#security-tools+3 |
| 2018-08-11 | Tool demo | Defcon |
HealthyPi—Connected Health
| Ashwin Whitchurch | #raspberry-pi#hardware-embedded#embedded-systems+4 |
| 2018-08-08 | Tool demo | Blackhat |
DARWIN: Real World Use Cases for Covert Wireless
| Arun Mane, Rushikesh D Nandedkar | #wifi#ieee802.15.4#embedded-systems |
| 2018-03-03 | Panel | Nullcon |
IoT : How long till D Day?
| Aseem Jakhar, Shobha Jagathpal, Rishikesh Kamat, Daniel Cisowski, Michael Pyle | #iot-device-management#iot-pentesting#embedded-systems+3 |
| 2017-08-18 | Talk | C0c0n |
Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure
| Manas Pratim Sarma | #blueteam#critical-infrastructure#cybersecurity-strategy+2 |
| 2017-08-18 | Talk | C0c0n |
CoAP versus MQTT: IoT Protocol Vulnerability analysis
| Rajiv Pandey | #security-assessment#iot-pentesting#embedded-systems+1 |
| 2017-08-18 | Talk | C0c0n |
Hacking Homes: A hardware insight for IoT [in]Security
| Jiggyasu Sharma | #red-teaming#hardware-embedded#firmware-analysis+2 |
| 2017-08-18 | Talk | C0c0n |
The Internet Of Things: Essentials of Secur(IOT)y
| Arpit Bajpai, Ronald Michael | #blueteam#iot-device-management#iot-pentesting+4 |
| 2017-07-27 | Talk | Defcon |
ICS Humla
| Sneha Rajguru, Arun Mane | #ics-security#security-assessment#embedded-systems+4 |
| 2017-04-14 | Talk | Hitbsecconf |
Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure
| Anirudh Duggal | #red-teaming#application-pentesting#data-protection+3 |
| 2017-03-03 | Talk | Nullcon |
Securing Critical National Infrastructure
| Shailendra Fuloria, R Sarangapani, Rahul Tongia, Michael Pyle, Justin Searle | #critical-infrastructure#ics-security#risk-management+3 |
| 2017-03-03 | Talk | Nullcon |
Case Study on RFID (proximity cards) hacking
| Sarwar Jahan, Ashwath Kumar | #rfid#red-teaming#hardware-embedded+4 |
| 2017-03-03 | Panel | Nullcon |
Hardware Security: Foundational Block of Cyber Battlefield
| Vinayak Godse, Amit Sharma, Aseem Jakhar, Minatee Mishra | #hardware-embedded#firmware-analysis#embedded-systems+4 |
| 2016-11-04 | Tool demo | Blackhat |
Firmware Analysis Toolkit (FAT)
| Aditya Gupta | #firmware#security-assessment#embedded-systems+3 |
| 2016-08-19 | Talk | C0c0n |
Attacking and crashing IOT devices via Bluetooth LE Protocol
| Pratap Chandra Allena, Ajay Pratap Singh | #bluetooth#red-teaming#iot-pentesting+2 |
| 2016-08-04 | Talk | Blackhat |
Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages
| Anirudh Duggal | #ics-security#risk-management#application-pentesting+3 |
| 2016-03-11 | Talk | Nullcon |
Hitchhiker’s guide to hacking Industrial Control systems (ICS)
| Arun Mane | #red-teaming#ics#hid |
| 2015-11-05 | Talk | Groundzerosummit |
Hacking RFIDs under 2000INR
| Jayesh Chauhan | #rfid#red-teaming#hardware-embedded+4 |
| 2015-11-05 | Talk | Groundzerosummit |
Cyber Security in Hospitals:Hospitals Under Seige
| Anirudh Duggal | #hl7#data-protection#incident-management |
| 2015-11-05 | Talk | Groundzerosummit |
Sanctioned to Hack: Your SCADA HMIs Belong to Us!
| Aditya K Sood | #ics-security#web-security#firmware-analysis+2 |
| 2015-09-25 | Talk | Appsecusa |
The State of Web Application Security in SCADA Web Human Machine Interfaces (HMIs)!
| Aditya K Sood | #scada#hmi#web-security+1 |
| 2015-08-08 | Talk | Defcon |
Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities
| Aditya K Sood | #scada#hmi#security-assessment+4 |
| 2015-08-01 | Talk | C0c0n |
From AOSP ( Android OpenSource Project ) to ABD ( Android Based Devices )
| Anto Joseph | #android#mobile-device-management#embedded-systems+2 |
| 2015-08-01 | Talk | C0c0n |
Hacking RFIDs under 2000 INR
| Jayesh Chauhan, Divya S John | #rfid#hardware-embedded#embedded-systems+3 |
| 2014-11-13 | Talk | Groundzerosummit |
Hacking consumer electronics for Fun
| Atul Alex | #red-teaming#embedded-systems#firmware-analysis+1 |
| 2014-11-13 | Talk | Groundzerosummit |
SCADA Exploitation through Firmware
| Ashish Saxena | #red-teaming#firmware-analysis#ics-security+3 |
| 2014-08-07 | Tool demo | Blackhat |
C-SCAD: Assessing Security flaws in clearscada Web_X client!
| Aditya K Sood | #red-teaming#security-assessment#ics-security+3 |
| 2014-03-18 | Talk | Troopers |
Evolution of SIM Card Security
| Ravishankar Borgaonkar | #3gpp#gsma#embedded-systems+4 |
| 2014-02-14 | Talk | Nullcon |
2014 The year in which we cannot ignore SCADA
| Amol Sarwate | #scada#blueteam#ics-security+4 |
| 2014-02-14 | Talk | Nullcon |
Null Hardware Badge 101 (Desi Jugaad)
| Amey Gat, Umesh | #microcontrollers#embedded-systems#hardware-embedded |
| 2013-11-21 | Talk | Deepsec |
Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy
| Parth Shukla | #botnet#telnet#network-architecture+3 |
| 2013-11-20 | Talk | Appsecusa |
Why is SCADA Security an Uphill Battle?
| Amol Sarwate | #scada#application-pentesting#application-hardening+4 |
| 2013-11-07 | Talk | Groundzerosummit |
Serial killing of embedded systems
| Atul Alex | #embedded-systems#hardware-embedded#firmware-analysis+1 |
| 2013-03-15 | Talk | Blackhat |
Vulnerability analysis of 2013 SCADA issues
| Amol Sarwate | #scada#ics-security#attack-surface+2 |
| 2012-12-01 | Talk | Clubhack |
Smart Grid Security
| Falgun Rathod | #blueteam#critical-infrastructure#cyber-physical-systems+2 |
| 2012-11-23 | Talk | Malcon |
Tampering in Energy Meters
| Mohit Arora | #energy-theft#embedded-systems#firmware-analysis+2 |
| 2012-03-15 | Talk | Hackinparis |
SCADA Security: Why Is It So Hard ?
| Amol Sarwate | #ics-security#scada#control-systems+2 |
| 2012-03-15 | Talk | Grrcon |
SCADA Security: Why is it so hard?
| Amol Sarwate | #scada#ics-security#authentication+2 |
| 2012-02-15 | Talk | Nullcon |
SCADA Security: Why is it so hard
| Amol Sarwate | #scada#ics-security#control-systems+1 |
| 2012-02-15 | Talk | Nullcon |
Open source revolution :Need Hardware - Software marriage
| Venkatesh | #embedded-systems#hardware-embedded#open-source-security |
| 2012-02-15 | Talk | Nullcon |
Teensy for fun and jugaad
| Amey Gat | #microcontrollers#embedded-systems#hid |
| 2011-12-14 | Talk | Blackhat |
SCADA Security - Why Is It So Hard?
| Amol Sarwate | #scada#ics-security#control-systems+1 |
| 2011-08-03 | Talk | Blackhat |
Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS
| Jatin Kataria, Ang Cui, Salvatore Stolfo | #cisco-ios#hardware-embedded#firmware-analysis+4 |
| 2009-12-05 | Talk | Clubhack |
Indian IT Act 2000 vs 2009
| Rohas Nagpal | #cyber-law#embedded-systems#firmware-analysis+4 |