| 2025-08-07 | Talk | Blackhat |
Uncovering ‘NASty’ 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing
| Kanika Gupta | reverse-engineeringfirmware-analysismobile-security+2 |
| 2025-03-02 | Talk | Nullcon |
Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks
| Shyam Kumar Arshid, Chinmay Krishna | embedded-securityfirmware-analysishardware-security+3 |
| 2024-11-28 | Talk | Blackhat |
A Tale of Pwning 500+ Vehicle Anti-theft Devices
| Umair Nehri | mobile-securityvulnerability-assessmentiot-pentesting+1 |
| 2024-11-21 | Talk | Deepsec |
Hacking with Physics v2.0
| Hrishikesh Somchatwar | industrial-control-systems-securityembedded-securityfirmware-analysis+3 |
| 2024-08-10 | Talk | Defcon |
Compromising an Electronic Logging Device and Creating a Truck2Truck Worm
| Rik Chatterjee | eldiot |
| 2024-04-19 | Talk | Blackhat |
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | embedded-securityfirmware-analysisvulnerability-management+2 |
| 2024-04-18 | Tool demo | Blackhat |
Genzai - The IoT Security Toolkit
| Umair Nehri | iot |
| 2023-08-10 | Talk | Defcon |
Wheels of Wonder: Unveiling Car Hacking Poetry
| Hrishikesh Somchatwar | firmware-analysisreverse-engineeringautomotive-cybersecurity+1 |
| 2023-08-10 | Talk | Defcon |
Hardware Backdooring an e-Scooter
| Arun Mane | reverse-engineeringindustrial-control-systems-securityvulnerability-management+2 |
| 2023-08-06 | Talk | C0c0n |
A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things
| Panchami V, Mahima Mary Mathews | authenticationprivacyembedded-security+1 |
| 2022-09-24 | Talk | C0c0n |
Introduction to RFID/NFC Hacking
| Davis Sojan | embedded-securityfirmware-analysishardware-security+3 |
| 2022-05-18 | Talk | Can Sec West |
Launching EMUX - A framework for emulating ARM and MIPS IoT Devices
| Saumil Shah | firmware-analysisreverse-engineeringembedded-security+1 |
| 2021-11-18 | Talk | Hackinparis |
{Internet of Things or Threats}: Anatomizing the Structure of IoT Botnets
| Aditya K Sood | iot |
| 2021-11-12 | Talk | C0c0n |
IoT Security Guidelines & Standards
| Yashodhan Vivek Mandke | embedded-securityiot-device-managementiot-security-testing+3 |
| 2021-08-06 | Talk | Defcon |
Defending IoT in the Future of High-Tech Warfare
| Harshit Agrawal | vulnerability-managementiot-pentestingsecurity-architecture+1 |
| 2021-08-05 | Talk | Blackhat |
PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors
| Hareesh Khattri, Nagaraju N Kodalapura | hardware-embedded |
| 2020-10-07 | Talk | Rootcon |
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing
| Kaustubh Padwad | iotredteampentest+1 |
| 2020-10-02 | Talk | Blackhat |
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
| Aravind Machiry | embedded-systems |
| 2020-10-01 | Tool demo | Blackhat |
Wi-Fi Access Point Rootkits
| Nishant Sharma, Jeswin Mathai | wifinetworkblueteam+1 |
| 2020-09-18 | Talk | C0c0n |
All about IOT Forensics
| Hima Bindu Vejella | iotforensic |
| 2020-09-18 | Talk | C0c0n |
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing
| Kaustubh Padwad | redteamiotpentest |
| 2020-09-18 | Talk | C0c0n |
Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux
| Munawwar Hussain Shelia | reverse-engineeringiot |
| 2020-03-18 | Talk | Can Sec West |
The ARM-X Firmware Emulation Framework
| Saumil Shah | redteamarmfirmware+5 |
| 2019-11-09 | Talk | Toor Con |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria | reverse-engineeringhardware-reverse-engineeringvulnerability-management+3 |
| 2019-10-16 | Tool demo | Hitb Sec Conf |
Introducing ARM-X - The ARM IoT Firmware Emulation Framework
| Saumil Shah | armiotlinux |
| 2019-10-14 | Talk | Hitb Sec Conf |
IoT Pentesting The Right Way
| Yogesh Ojha | iotpentest |
| 2019-10-11 | Talk | Texas Cyber Summit |
Exploit The State of Embedded Web Security in IoT Devices !
| Aditya K Sood | iot |
| 2019-09-27 | Talk | C0c0n |
Defense in Depth for Embedded Systems
| Jiggyasu Sharma | embedded-systemsblueteam |
| 2019-09-23 | Talk | Rootcon |
Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking
| Arun Mane | iotredteamics |
| 2019-08-09 | Tool demo | Defcon |
EXPLIoT - IoT Security Testing and Exploitation Framework
| Aseem Jakhar, Murtuja Bharmal | iotpentestredteam+2 |
| 2019-08-09 | Talk | Defcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria | reverse-engineeringvulnerability-managementsecurity-architecture+2 |
| 2019-08-09 | Tool demo | Defcon |
Srujan: Safer Networks for Smart Homes
| Sanket Karpe, Parmanand Mishra | smart-devicesAutomationnetwork+2 |
| 2019-08-08 | Tool demo | Blackhat |
EXPLIoT: IoT Security Testing and Exploitation Framework
| Aseem Jakhar, Murtuja Bharmal | iotpentestredteam+2 |
| 2019-08-08 | Tool demo | Blackhat |
RWDD: Remote Web Deface Detection Tool
| K v Prashant | webiotblueteam |
| 2019-05-21 | Talk | Phdays |
Rapid hardware hacking 101
| Arun Magesh | hardwareredteamiot |
| 2019-05-10 | Talk | Hitb Sec Conf |
HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR
| Himanshu Mehta, Harshit Agrawal | networkrfiot+1 |
| 2019-02-28 | Talk | Nullcon |
Building Hardened IoT Implementations with LangSec
| Prashant Anantharaman | iotblueteamsecure-development |
| 2018-11-02 | Talk | Hackfest |
Exploiting Connected Medical Devices: Lessons Learned & Data Earned
| Saurabh Harit | healthcareredteamiot+1 |
| 2018-10-05 | Talk | C0c0n |
Cybersecurity Embedded Digital Transformation - The Future
| Sunil Kanchi | embedded-securitysecurity-architectureindustrial-control-systems-security |
| 2018-09-27 | Talk | Rootcon |
Expl-iot: Hacking IoT like a boss
| Aseem Jakhar | iotredteam |
| 2018-08-12 | Tool demo | Defcon |
Expl-iot—IoT Security Testing and Exploitation framework
| Aseem Jakhar | iotpentestredteam+2 |
| 2018-08-09 | Talk | Defcon |
Backdooring DVR/NVR devices
| Arun Mane | hardware-reverse-engineeringembedded-securitypentesting+3 |
| 2018-08-08 | Tool demo | Blackhat |
Expl-iot: IoT Security Testing and Exploitation Framework
| Aseem Jakhar | iotpentestredteam+2 |
| 2018-07-21 | Talk | Hope |
Evidential Study of IoT Botnets - The Bad and The Ugly!
| Aditya K Sood | iot |
| 2018-03-22 | Talk | Blackhat |
Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables
| Sumanth Naropanth, Kavya Racharla | wearablesblueteamredteam+2 |
| 2017-12-06 | Talk | Blackhat |
BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES
| Saurabh Harit | healthcareredteamiot |
| 2017-12-06 | Tool demo | Blackhat |
EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK
| Aseem Jakhar | iotpentestredteam+2 |
| 2017-11-14 | Talk | Blackhat |
Pwning a Smart Home in Under 10 Minutes
| Aditya Gupta | iot-pentestingembedded-securitypentesting+3 |
| 2017-10-05 | Talk | Virus Bulletin |
The router of all evil: more than just default passwords and silly scripts
| Himanshu Anand | vulnerability-managementreverse-engineeringpentesting+1 |
| 2017-08-18 | Talk | C0c0n |
CoAP versus MQTT: IoT Protocol Vulnerability analysis
| Rajiv Pandey | iotpentest |
| 2017-08-18 | Talk | C0c0n |
Hacking Homes: A hardware insight for IoT [in]Security
| Jiggyasu Sharma | iotredteam |
| 2017-08-18 | Talk | C0c0n |
The Internet Of Things: Essentials of Secur(IOT)y
| Arpit Bajpai, Ronald Michael | iotblueteam |
| 2017-08-04 | Talk | Sha |
Attacking OpenSSL using Side-channel Attacks: The RSA case study
| Praveen Vadnala | reverse-engineeringvulnerability-managementsecurity-architecture+1 |
| 2017-07-27 | Talk | Defcon |
ICS Humla
| Sneha Rajguru, Arun Mane | ics-securityindustrial-control-systems-securitypentesting+2 |
| 2017-04-14 | Talk | Hitb Sec Conf |
COMMSEC: IoT Hacking Simplified
| Aseem Jakhar | iotredteam |
| 2016-11-04 | Tool demo | Blackhat |
Firmware Analysis Toolkit (FAT)
| Aditya Gupta | firmwareanalysisiot+1 |
| 2016-08-19 | Talk | C0c0n |
Attacking and crashing IOT devices via Bluetooth LE Protocol
| Pratap Chandra Allena, Ajay Pratap Singh | iotbluetoothnetwork+1 |
| 2016-08-05 | Talk | Defcon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria | reverse-engineeringhardware-reverse-engineeringfirmware-analysis+3 |
| 2016-06-18 | Talk | Recon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria | reverse-engineeringhardware-reverse-engineeringfirmware-analysis+3 |
| 2016-03-11 | Talk | Nullcon |
Physical Lock Security
| Amey Gat, Swapnil Wadwalkar | pentestingreverse-engineeringvulnerability-management+1 |
| 2015-11-05 | Talk | Ground Zero Summit |
Sanctioned to Hack: Your SCADA HMIs Belong to Us!
| Aditya K Sood | ics-securityweb-securityvulnerability-management+3 |
| 2014-02-14 | Talk | Nullcon |
Null Hardware Badge 101 (Desi Jugaad)
| Amey Gat, Umesh | iot |
| 2013-11-07 | Talk | Ground Zero Summit |
Serial killing of embedded systems
| Atul Alex | embedded-systems |
| 2012-02-15 | Talk | Nullcon |
Teensy for fun and jugaad
| Amey Gat | iot |