🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Industrial Control Systems Security

Industrial control systems security and related activities

45
Total Entries
38
Contributors
48
Unique Tags
55
Related Tags

Top Contributors

Amol Sarwate(7) Harshit Agrawal(4) Arun Mane(3) Aditya K Sood(2) Hrishikesh Somchatwar(2)

Related Tags (13)

Show all 13 tags...

All Entries (45 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06TalkBlackhat Adversarial Fuzzer for Teleoperation Commands: Evaluating Autonomous Vehicle Resilience Shanit Guptaautomotive-cybersecurityvulnerability-managementsecurity-testing+1
2025-03-02TalkNullcon Satellite Communications: Analyzing and Protecting Space-Based Assets Drishti Jainnetwork-pentestingvulnerability-managementindustrial-control-systems-security
2024-11-26TalkBlackhat Critical Exposures: Lessons from a Decade of Vulnerability Research Nikhil Shrivastavavulnerability-managementsql-injectionpentesting+2
2024-11-21TalkDeepsec Hacking with Physics v2.0 Hrishikesh Somchatwarindustrial-control-systems-securityembedded-securityfirmware-analysis+3
2024-11-15TalkC0c0n Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate Kartik Lalanautomotive-cybersecurityvulnerability-managementreverse-engineering+2
2024-08-30TalkHitb Sec Conf Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles Presentation Video Ravi Rajputweb-securitypentestingexploitation+4
2024-08-08Tool demoBlackhat ICSGoat: A Damn Vulnerable ICS Infrastructure Source Code Shantanu Kale, Divya Nainics-securityscadaplc+3
2024-04-19TalkBlackhat China’s Military Cyber Operations: Has the Strategic Support Force Come of Age? Presentation Pukhraj Singhindustrial-control-systems-securityrisk-managementsecurity-architecture
2024-04-19TalkBlackhat Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems Presentation Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyayembedded-securityfirmware-analysisvulnerability-management+2
2023-09-23TalkNullcon Journey in setting up OT SOC Presentation Ramandeep Singh Waliasocics-securityindustrial-control-systems-security+3
2023-08-10TalkDefcon Attacking Vehicle Fleet Management Systems Presentation Video Yashin Mehaboobeautomotive-cybersecurityvulnerability-managementindustrial-control-systems-security
2023-08-10TalkDefcon Hardware Backdooring an e-Scooter Arun Manereverse-engineeringindustrial-control-systems-securityvulnerability-management+2
2023-08-10TalkDefcon Wheels of Wonder: Unveiling Car Hacking Poetry Presentation Video Hrishikesh Somchatwarfirmware-analysisreverse-engineeringautomotive-cybersecurity+1
2023-08-07TalkC0c0n Exploring Threats in Operational Technology Manjunath Hiregangeics-securityindustrial-control-systems-securityoperational-technology+2
2023-08-07TalkC0c0n Trust Resiliency - A Lesson Learned from Russia Ukraine War Video Ajit Hattiincident-responsesecurity-architecturerisk-management+2
2022-09-28TalkRootcon Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations Harshit Agrawalindustrial-control-systems-securitysecurity-architecturerisk-management+1
2022-09-24TalkC0c0n CANalyse: A Vehicle Network Analysis and Attack Tool Kartheek Ladenetwork-pentestingnetwork-traffic-analysiscan-bus+1
2022-09-23TalkC0c0n Cybersecurity for Manufacturing Santhosh Srinivasanindustrial-control-systems-securityics-securitycontrol-systems+4
2022-08-14TalkDefcon Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right Vivek Ponnadaindustrial-control-systems-securityvulnerability-managementrisk-management+2
2021-11-13TalkC0c0n Securing OT in O&G Industry George Eapenics-securityindustrial-control-systems-securitycontrol-systems+2
2021-11-13TalkC0c0n A look into cyber-espionage activities targeting critical infrastructure in India Saurabh Sharmaindustrial-control-systems-securitycritical-infrastructurethreat-hunting+1
2021-11-13TalkC0c0n Cyber Warfare & Securing Critical Infrastructures Faruk Kazicritical-infrastructureindustrial-control-systems-securityincident-response+1
2021-11-12TalkC0c0n ICS Security —- A need, a challenge and a new change in Mindset Dhruv Guptaics-securityindustrial-control-systems-securitycritical-infrastructure+2
2021-10-13TalkRootcon The Kill Chain: Future of Cyber in Defense Video Harshit Agrawalsecurity-architectureindustrial-control-systems-securityrisk-management
2021-08-26TalkHitb Sec Conf Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade Presentation Video Harshit Agrawalindustrial-control-systems-securitysecurity-architecturevulnerability-management+1
2021-08-08TalkDefcon Top 20 Secure PLC Coding Practices Video Vivek Ponnadaindustrial-control-systems-securitysecure-codingvulnerability-management+3
2021-08-06TalkDefcon Defending IoT in the Future of High-Tech Warfare Video Harshit Agrawalvulnerability-managementiot-pentestingsecurity-architecture+1
2020-04-24TalkHitb Sec Conf COMMSEC: The State of ICS Security : Then and Now Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlotscadablueteampentest+1
2019-09-27TalkC0c0n Industry 4.0 - Security and Compliance Santhosh Srinivasanindustrial-control-systems-securitycompliancegovernance+2
2019-09-27TalkC0c0n Looking a decade ahead: Big data, drones , Robots and cyber security. Rahul Sasiindustrial-control-systems-securitysecurity-architecture
2019-08-08TalkDefcon Hacking ICS devices for Fun Penetration Testing of Vehicle Components Video Arun Maneautomotive-cybersecuritycan-busics-security+3
2018-10-05TalkC0c0n Future of Mobility & Cyber Security Suja Chandyautomotive-cybersecurityindustrial-control-systems-securitysecurity-architecture+2
2018-10-05TalkC0c0n Cybersecurity Embedded Digital Transformation - The Future Sunil Kanchiembedded-securitysecurity-architectureindustrial-control-systems-security
2017-07-27TalkDefcon ICS Humla Presentation Video Sneha Rajguru, Arun Maneics-securityindustrial-control-systems-securitypentesting+2
2017-03-03TalkNullcon Securing Critical National Infrastructure Video Shailendra Fuloria, R Sarangapani, Rahul Tongiacritical-infrastructureindustrial-control-systems-securityics-security+4
2016-08-04TalkBlackhat Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages Video Anirudh Duggalvulnerability-managementindustrial-control-systems-securityrisk-management
2015-11-05TalkGround Zero Summit Sanctioned to Hack: Your SCADA HMIs Belong to Us! Aditya K Soodics-securityweb-securityvulnerability-management+3
2015-08-08TalkDefcon Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Video Aditya K Soodscadainfrastructurehmi+6
2014-02-14TalkNullcon 2014 The year in which we cannot ignore SCADA Presentation Video Amol Sarwatescadainfrastructureblueteam
2013-11-20TalkApp Sec Usa Why is SCADA Security an Uphill Battle? Video Amol Sarwatescada
2013-03-15TalkBlackhat Vulnerability analysis of 2013 SCADA issues Presentation Video Amol Sarwatescada
2012-03-15TalkHackinparis SCADA Security: Why Is It So Hard ? Video Amol Sarwateics-securityindustrial-control-systems-securityscada+3
2012-03-15TalkGrr Con SCADA Security: Why is it so hard? Video Amol Sarwatescada
2012-02-15TalkNullcon SCADA Security: Why is it so hard Amol Sarwatescadainfrastructure
2011-12-14TalkBlackhat SCADA Security - Why Is It So Hard? Presentation Whitepaper Source Code Amol Sarwatescadainfrastructure