| 2025-04-04 | Tool demo | Blackhat |
CompartIoT
| Sreesankar S, Aditya Krishna Vinod, Season Cherian | #microcontrollers#hardware-embedded#firmware-analysis+2 |
| 2025-04-03 | Tool demo | Blackhat |
CompartIoT
| Sreesankar S, Aditya Krishna Vinod, Season Cherian | #microcontrollers#hardware-embedded#firmware-analysis+2 |
| 2025-03-02 | Talk | Nullcon |
Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks
| Shyam Kumar Arshid, Chinmay Krishna | #embedded-security#firmware-analysis#secure-coding+1 |
| 2025-03-02 | Panel | Nullcon |
Tackling Automotive Hardware Vulnerabilities
| Aseem Jakhar, Sachin Jain, Adam Laurie | #automotive-cybersecurity#embedded-systems#hardware-embedded+3 |
| 2024-12-12 | Tool demo | Blackhat |
Genzai - The IoT Security Toolkit
| Umair Nehri | #genzai#iot-device-management#iot-pentesting+4 |
| 2024-11-21 | Talk | Securityfest |
Wheels of Wonder
| Hrishikesh Somchatwar | #automotive-cybersecurity#car-hacking#embedded-systems+4 |
| 2024-11-21 | Talk | Deepsec |
Hacking with Physics v2.0
| Hrishikesh Somchatwar | #ics-security#embedded-security#firmware-analysis+2 |
| 2024-08-10 | Talk | Defcon |
Compromising an Electronic Logging Device and Creating a Truck2Truck Worm
| Rik Chatterjee, Jake Jepson | #eld#embedded-systems#ics-security+3 |
| 2024-08-10 | Panel | Defcon |
Color Blasted Badge Making: How Hard Could It Be ?
| Abhinav Panda, Hamster, Bradan Lane | #hardware-embedded#embedded-systems#hardware-hacking |
| 2024-08-07 | Talk | Blackhat |
The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition
| Arun Kanuparthi, Hareesh Khattri, Jeyavijayan Jv Rajendran, Jason Fung, Ahmad Reza Sadeghi | #hacking#embedded-systems#ctf |
| 2024-08-07 | Tool demo | Blackhat |
TrafficWardenX: OpenWRT Security & Monitoring
| Sampad Adhikary, Tripti Sharma | #openwrt#network-monitoring#security-tools+3 |
| 2024-04-19 | Tool demo | Blackhat |
GearGoat : Car Vulnerabilities Simulator
| Nishant Sharma, Pranjal Soni, Sanjeev Mahunta | #car-hacking#iot-device-management#iot-pentesting+3 |
| 2024-04-19 | Talk | Blackhat |
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | #embedded-security#firmware-analysis#architecture+1 |
| 2024-04-18 | Tool demo | Blackhat |
Genzai - The IoT Security Toolkit
| Umair Nehri | #iot-security-testing#iot-pentesting#device-security+1 |
| 2024-04-18 | Talk | Blackhat |
The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition
| Arun Kanuparthi, Hareesh Khattri, Jeyavijayan Jv Rajendran, Jason Fung, Ahmad Reza Sadeghi | #hacking#embedded-systems#ctf+1 |
| 2024-03-11 | Talk | Nullcon |
Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC
| Arpan Jati | #vulnerability-assessment#embedded-systems#firmware-analysis |
| 2023-09-23 | Talk | Nullcon |
Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers
| Rishit Bansal | #reverse-engineering#linux#firmware-analysis |
| 2023-08-10 | Talk | Defcon |
Attacking Vehicle Fleet Management Systems
| Yashin Mehaboobe | #automotive-cybersecurity#ics-security#embedded-systems+4 |
| 2023-08-10 | Talk | Defcon |
Wheels of Wonder: Unveiling Car Hacking Poetry
| Hrishikesh Somchatwar | #firmware-analysis#reverse-engineering#automotive-cybersecurity |
| 2023-08-06 | Talk | C0c0n |
A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things
| Panchami V, Mahima Mary Mathews | #authentication#data-protection#embedded-security |
| 2023-05-12 | Tool demo | Blackhat |
Introducing the Operating System for Automotive Security Testing: A Hands-on Demonstration
| Ravi Rajput | #automobile#automotive-cybersecurity#embedded-systems+4 |
| 2023-05-11 | Tool demo | Blackhat |
CANalyse 2.0 : A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | #automobile#car-hacking#iot-device-management+4 |
| 2023-04-20 | Talk | Hitbsecconf |
BYPASSING ANTI-CHEATS & HACKING COMPETITIVE GAMES
| Rohan Aggarwal | #hacking#hardware-hacking#bypassing+3 |
| 2022-09-24 | Talk | C0c0n |
Introduction to RFID/NFC Hacking
| Davis Sojan | #embedded-security#firmware-analysis#security-assessment+1 |
| 2022-09-23 | Talk | C0c0n |
TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor
| Saurabh Sharma, Noushin Shabab | #reverse-engineering#security-assessment#iot-pentesting |
| 2022-09-06 | Panel | Nullcon |
IoT Supply Chain Blues and the way forward
| Aseem Jakhar, Kedar Sovani, Anantharaman Iyer, Suvabrata Sinha, Sudarshan Rajagopal, Sachin Jain | #iot-device-management#iot-pentesting#supply-chain-security+3 |
| 2022-08-11 | Talk | Blackhat |
RollBack - A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems
| Soundarya Ramesh, Levente Csikor, Hoon Wei Lim, Jun Wen Wong, Rohini Poolat Parameswarath, Chan Mun Choon | #automobile#automotive-cybersecurity#car-hacking+2 |
| 2022-08-10 | Tool demo | Blackhat |
CANalyse (2.0): A vehicle network analysis and attack tool
| Kartheek Lade, Rahul Jeyasingh | #automobile#car-hacking#iot-device-management+4 |
| 2022-05-18 | Talk | Cansecwest |
Launching EMUX - A framework for emulating ARM and MIPS IoT Devices
| Saumil Shah | #firmware-analysis#reverse-engineering#embedded-security |
| 2022-05-12 | Talk | Blackhat |
Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems
| Prashant Rajput, Michail Maniatakos | #ics-security#control-systems#hardware-embedded+3 |
| 2022-03-25 | Talk | Insomnihack |
Attacking Bluetooth LE design and implementation in mobile + wearables ecosystems
| Nitin Lakshmanan, Sunil Kumar 1 | #bluetooth#hardware-embedded#iot-pentesting+4 |
| 2022-03-24 | Talk | Insomnihack |
Practical exploitation of zigbee-class networks with USB-based RF transceivers & open source software
| Nitin Lakshmanan, Sunil Kumar 1 | #iot-pentesting#wireless-security#hardware-hacking+3 |
| 2021-11-19 | Talk | Hackfest |
Hacking with Physics
| Hrishikesh Somchatwar | #ics-security#automotive-cybersecurity#embedded-systems+4 |
| 2021-11-18 | Talk | Hackinparis |
{Internet of Things or Threats}: Anatomizing the Structure of IoT Botnets
| Aditya K Sood | #iot-pentesting#iot-security-testing#botnet |
| 2021-11-12 | Talk | C0c0n |
IoT Security Guidelines & Standards
| Yashodhan Vivek Mandke | #embedded-security#iot-device-management#iot-security-testing+3 |
| 2021-08-06 | Talk | Defcon |
Defending IoT in the Future of High-Tech Warfare
| Harshit Agrawal | #iot-pentesting#architecture#ics-security |
| 2021-08-05 | Talk | Blackhat |
PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors
| Hareesh Khattri, Nagaraju N Kodalapura, Nam N Nguyen | #hardware-embedded#endpoint-protection#incident-management+1 |
| 2021-05-07 | Tool demo | Blackhat |
CANalyse: A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | #automobile#car-hacking#iot-device-management+4 |
| 2021-03-05 | Talk | Nullcon |
Arbitrary code execution on RISC-V using fault injection
| Praveen Vadnala, Nils Wiersma | #code-analysis#hardware-embedded#embedded-systems+1 |
| 2021-03-05 | Panel | Nullcon |
CyberPhysical Systems Security - Trends, challenges & opportunities
| Frank Sanjay, Khushwant Pawar, Mayur Mehta, Faruk Kazi | #industrial-control-systems#operational-technology#embedded-systems+3 |
| 2020-11-11 | Talk | Powerofcommunity |
Arbitrary code execution on RISC-V using fault injection
| Praveen Vadnala, Nils Wiersma | #fault-injection#embedded-security#firmware-analysis+1 |
| 2020-10-02 | Talk | Blackhat |
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
| Aravind Machiry, Nilo Redini, Andrea Continella, Ruoyu Wang, Yan Shoshitaishvili, Cristopher Kruegel, Giovanni Vigna, Chad Spensky | #embedded-systems#firmware-analysis#static-analysis+1 |
| 2020-10-01 | Tool demo | Blackhat |
Wi-Fi Access Point Rootkits
| Nishant Sharma, Jeswin Mathai | #wifi#blueteam#iot-pentesting+1 |
| 2020-09-18 | Talk | C0c0n |
All about IOT Forensics
| Hima Bindu Vejella | #forensics#iot-device-management#iot-pentesting+4 |
| 2020-09-18 | Talk | C0c0n |
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing
| Kaustubh Padwad | #red-teaming#security-assessment#iot-device-management+4 |
| 2020-09-18 | Talk | C0c0n |
Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux
| Munawwar Hussain Shelia | #reverse-engineering#firmware-analysis#embedded-systems+4 |
| 2019-12-04 | Talk | Blackhat |
Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing
| Karthik Ramasamy, Eric Hampshire | #blueteam#smartcard#mfa+4 |
| 2019-11-09 | Talk | Toorcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Ang Cui | #reverse-engineering#hardware-reverse-engineering#architecture+2 |
| 2019-10-16 | Tool demo | Hitbsecconf |
Introducing ARM-X - The ARM IoT Firmware Emulation Framework
| Saumil Shah | #arm#linux#firmware-analysis+4 |
| 2019-10-11 | Talk | Texascybersummit |
Exploit The State of Embedded Web Security in IoT Devices !
| Aditya K Sood | #iot-security-testing#web-security#embedded-security |
| 2019-09-27 | Talk | C0c0n |
Defense in Depth for Embedded Systems
| Jiggyasu Sharma | #embedded-systems#blueteam#hardware-embedded+4 |
| 2019-09-23 | Talk | Rootcon |
Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking)
| Arun Mane, Nikhil Bogam | #red-teaming#car-hacking#blueteam+1 |
| 2019-09-23 | Talk | Rootcon |
Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking
| Arun Mane | #red-teaming#ics#ics-security+3 |
| 2019-08-09 | Award | |
Thrangrycat - Pwnie Award for Most Under-Hyped Research
| Jatin Kataria, Richard Housley, Ang Cui | #reverse-engineering#hardware-embedded#firmware-analysis+2 |
| 2019-08-09 | Talk | Defcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Rick Housley, Ang Cui | #reverse-engineering#architecture#hardware-reverse-engineering+1 |
| 2019-08-09 | Tool demo | Defcon |
Srujan: Safer Networks for Smart Homes
| Sanket Karpe, Parmanand Mishra | #smart-devices#raspberry-pi#smart-homes |
| 2019-08-08 | Talk | Blackhat |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Richard Housley, Ang Cui | #reverse-engineering#hardware-embedded#exploit-delivery+3 |
| 2019-05-28 | Talk | Securityfest |
RF Exploitation: Demystifying IoT/OT hacks with SDR
| Himanshu Mehta, Harshit Agrawal | #rf#iot-pentesting#operational-technology+1 |
| 2019-05-21 | Talk | Phdays |
How to fail in hardware hacking
| Arun Magesh | #red-teaming#embedded-systems#firmware-analysis+1 |
| 2019-05-21 | Talk | Phdays |
Rapid hardware hacking 101
| Arun Magesh | #red-teaming#iot-pentesting#hardware-embedded+2 |
| 2019-05-10 | Talk | Hitbsecconf |
HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR
| Himanshu Mehta, Harshit Agrawal | #rf#red-teaming#hardware-embedded+3 |
| 2019-05-09 | Talk | Hitbsecconf |
Make ARM Shellcode Great Again
| Saumil Shah | #arm#embedded-systems#firmware-analysis+1 |
| 2019-03-02 | Panel | Nullcon |
CISO Strategy for OT and IoT risk and Threat Management
| Gaurav Shukla, Gomeet Pant, Rakesh Viswanathan, Sudarshan Rajagopal | #ics-security#iot-pentesting#cybersecurity-strategy+3 |
| 2019-02-28 | Talk | Nullcon |
Building Hardened IoT Implementations with LangSec
| Prashant Anantharaman | #blueteam#secure-development#input-validation+4 |
| 2018-11-08 | Talk | Defcamp |
Backdooring DVR/NVR devices
| Arun Mane | #hardware-reverse-engineering#embedded-security#security-assessment+2 |
| 2018-11-02 | Talk | Hackfest |
Exploiting Connected Medical Devices: Lessons Learned & Data Earned
| Saurabh Harit | #red-teaming#wearables#iot-device-management+4 |
| 2018-10-15 | Talk | Hacklu |
Make ARM Shellcode Great Again
| Saumil Shah | #arm#embedded-systems#firmware-analysis |
| 2018-10-05 | Talk | C0c0n |
Cybersecurity Embedded Digital Transformation - The Future
| Sunil Kanchi | #embedded-security#architecture#ics-security |
| 2018-09-27 | Talk | Rootcon |
Expl-iot: Hacking IoT like a boss
| Aseem Jakhar | #red-teaming#iot-security-testing#firmware-analysis+2 |
| 2018-09-12 | Talk | 44con |
Make ARM Shellcode Great Again
| Saumil Shah | #arm#embedded-systems#security-tools+3 |
| 2018-08-11 | Tool demo | Defcon |
HealthyPi—Connected Health
| Ashwin Whitchurch | #raspberry-pi#hardware-embedded#embedded-systems+4 |
| 2018-08-08 | Tool demo | Blackhat |
V2X Validation Tool
| Raashid Ansari, Jonathan Petit | #security-assessment#automobile#red-teaming |
| 2018-08-08 | Tool demo | Blackhat |
DARWIN: Real World Use Cases for Covert Wireless
| Arun Mane, Rushikesh D Nandedkar | #wifi#ieee802.15.4#embedded-systems |
| 2018-07-21 | Talk | Hope |
Evidential Study of IoT Botnets - The Bad and The Ugly!
| Aditya K Sood | #botnet#iot-security-testing#malware-research |
| 2018-03-03 | Panel | Nullcon |
IoT : How long till D Day?
| Aseem Jakhar, Shobha Jagathpal, Rishikesh Kamat, Daniel Cisowski, Michael Pyle | #iot-device-management#iot-pentesting#embedded-systems+3 |
| 2017-12-06 | Talk | Blackhat |
BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES
| Saurabh Harit | #red-teaming#data-leak#identity-theft+1 |
| 2017-11-14 | Talk | Blackhat |
Pwning a Smart Home in Under 10 Minutes
| Aditya Gupta | #iot-pentesting#embedded-security#security-assessment+2 |
| 2017-10-05 | Talk | Virusbulletin |
The router of all evil: more than just default passwords and silly scripts
| Himanshu Anand, Chastine Menrige | #reverse-engineering#security-assessment#firmware-analysis |
| 2017-08-18 | Talk | C0c0n |
Hacking Homes: A hardware insight for IoT [in]Security
| Jiggyasu Sharma | #red-teaming#hardware-embedded#firmware-analysis+2 |
| 2017-08-18 | Talk | C0c0n |
The Internet Of Things: Essentials of Secur(IOT)y
| Arpit Bajpai, Ronald Michael | #blueteam#iot-device-management#iot-pentesting+4 |
| 2017-08-18 | Talk | C0c0n |
CoAP versus MQTT: IoT Protocol Vulnerability analysis
| Rajiv Pandey | #security-assessment#iot-pentesting#embedded-systems+1 |
| 2017-08-18 | Talk | C0c0n |
Exploiting the smartness of BLE Stack
| Apoorva Gupta | #bluetooth#red-teaming#mobile-hacking+3 |
| 2017-08-17 | Talk | Usenix |
BootStomp: On the Security of Bootloaders in Mobile Devices
| Aravind Machiry, Dipanjan Das, Nilo Redini, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvali, Christopher Kruegel, Giovanni Vigna | #firmware-analysis#embedded-security#binary-analysis+1 |
| 2017-08-04 | Talk | Sha |
Attacking OpenSSL using Side-channel Attacks: The RSA case study
| Praveen Vadnala, Lukasz Chmielewski | #reverse-engineering#architecture#embedded-security |
| 2017-07-29 | Tool demo | Defcon |
WiMonitor - an OpenWRT package for remote WiFi sniffing
| Vivek Ramachandran, Nishant Sharma, Ashish Bhangale | #openwrt#red-teaming#sniffing+1 |
| 2017-07-27 | Talk | Defcon |
ICS Humla
| Sneha Rajguru, Arun Mane | #ics-security#security-assessment#embedded-systems+4 |
| 2017-06-24 | Talk | Lehack |
When encryption is not enough: Attacking Wearable - Mobile communication over BLE
| Sumanth Naropanth, Eliza Chelleng, Kavya Racharla | #bluetooth#device-security#encryption+3 |
| 2017-04-14 | Talk | Hitbsecconf |
COMMSEC: IoT Hacking Simplified
| Aseem Jakhar | #red-teaming#iot-pentesting#hardware-embedded+2 |
| 2017-03-03 | Talk | Nullcon |
Case Study on RFID (proximity cards) hacking
| Sarwar Jahan, Ashwath Kumar | #rfid#red-teaming#hardware-embedded+4 |
| 2017-03-03 | Panel | Nullcon |
Hardware Security: Foundational Block of Cyber Battlefield
| Vinayak Godse, Amit Sharma, Aseem Jakhar, Minatee Mishra | #hardware-embedded#firmware-analysis#embedded-systems+4 |
| 2017-02-14 | Talk | Rsac |
Side-Channel Resistant Implementations
| Praveen Vadnala | #side-channel-attacks#embedded-security#encryption |
| 2016-11-04 | Tool demo | Blackhat |
Firmware Analysis Toolkit (FAT)
| Aditya Gupta | #firmware#security-assessment#embedded-systems+3 |
| 2016-08-19 | Talk | C0c0n |
Attacking and crashing IOT devices via Bluetooth LE Protocol
| Pratap Chandra Allena, Ajay Pratap Singh | #bluetooth#red-teaming#iot-pentesting+2 |
| 2016-08-19 | Talk | C0c0n |
Threats in Connected World
| Bhavin Gandhi | #iot-pentesting#device-security#threat-landscape |
| 2016-08-05 | Talk | Defcon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria, Ang Cui, Francois Charbonneau | #reverse-engineering#hardware-reverse-engineering#firmware-analysis+2 |
| 2016-06-18 | Talk | Recon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria, Ang Cui, Francois Charbonneau | #reverse-engineering#hardware-reverse-engineering#firmware-analysis+2 |
| 2015-11-05 | Talk | Groundzerosummit |
Hacking RFIDs under 2000INR
| Jayesh Chauhan | #rfid#red-teaming#hardware-embedded+4 |
| 2015-11-05 | Talk | Groundzerosummit |
Sanctioned to Hack: Your SCADA HMIs Belong to Us!
| Aditya K Sood | #ics-security#web-security#firmware-analysis+2 |
| 2015-11-05 | Talk | Groundzerosummit |
Cyber Security in Hospitals:Hospitals Under Seige
| Anirudh Duggal | #hl7#data-protection#incident-management |
| 2015-08-01 | Talk | C0c0n |
From AOSP ( Android OpenSource Project ) to ABD ( Android Based Devices )
| Anto Joseph | #android#mobile-device-management#embedded-systems+2 |
| 2015-08-01 | Talk | C0c0n |
Hacking RFIDs under 2000 INR
| Jayesh Chauhan, Divya S John | #rfid#hardware-embedded#embedded-systems+3 |
| 2015-08-01 | Talk | C0c0n |
Reversing and Deciphering the Cyber Espionage Malware Communications
| Monnappa K A | #reverse-engineering#decipher#malware-research+3 |
| 2015-02-06 | Talk | Nullcon |
Drone Attacks: How I hijacked a drone
| Rahul Sasi | #red-teaming#drone#gps+2 |
| 2014-11-13 | Talk | Groundzerosummit |
Security vulnerabilities in DVB-C networks: Hacking Cable TV network
| Rahul Sasi | #red-teaming#dvb-c#network-pentesting |
| 2014-11-13 | Talk | Groundzerosummit |
Hacking consumer electronics for Fun
| Atul Alex | #red-teaming#embedded-systems#firmware-analysis+1 |
| 2014-11-13 | Talk | Groundzerosummit |
SCADA Exploitation through Firmware
| Ashish Saxena | #red-teaming#firmware-analysis#ics-security+3 |
| 2014-10-29 | Talk | Ekoparty |
Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2
| Rahul Sasi | #red-teaming#dvb-c#firmware-analysis+1 |
| 2014-05-29 | Talk | Hitbsecconf |
Hacking Your Cable TV Network: Die Hard Style
| Rahul Sasi | #red-teaming#iptv#reverse-engineering |
| 2014-03-18 | Talk | Troopers |
Evolution of SIM Card Security
| Ravishankar Borgaonkar | #3gpp#gsma#embedded-systems+4 |
| 2014-02-14 | Talk | Nullcon |
Null Hardware Badge 101 (Desi Jugaad)
| Amey Gat, Umesh | #microcontrollers#embedded-systems#hardware-embedded |
| 2014-02-14 | Talk | Nullcon |
Hacking YOu’r Cable TV Network.
| Rahul Sasi, Ahamed Nafeez | #red-teaming#network-pentesting#endpoint-protection+1 |
| 2013-11-07 | Talk | Groundzerosummit |
Serial killing of embedded systems
| Atul Alex | #embedded-systems#hardware-embedded#firmware-analysis+1 |
| 2013-03-07 | Talk | Cansecwest |
SMS to Meterpreter - Fuzzing USB Modems
| Rahul Sasi | #red-teaming#fuzzing#hardware-embedded |
| 2012-12-01 | Talk | Clubhack |
Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC
| Aditya Gupta, Subho Halder | #nfc#red-teaming#android-security+4 |
| 2012-11-23 | Talk | Malcon |
Tampering in Energy Meters
| Mohit Arora | #energy-theft#embedded-systems#firmware-analysis+2 |
| 2012-02-15 | Talk | Nullcon |
Open source revolution :Need Hardware - Software marriage
| Venkatesh | #embedded-systems#hardware-embedded#open-source-security |
| 2012-02-15 | Talk | Nullcon |
Teensy for fun and jugaad
| Amey Gat | #microcontrollers#embedded-systems#hid |
| 2011-12-15 | Talk | Blackhat |
Kautilya: Teensy Beyond Shell
| Nikhil Mittal | #hid#red-teaming#endpoint-protection+3 |
| 2011-08-03 | Talk | Blackhat |
Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS
| Jatin Kataria, Ang Cui, Salvatore Stolfo | #cisco-ios#hardware-embedded#firmware-analysis+4 |
| 2011-08-03 | Talk | Blackhat |
Femtocells: A poisonous needle in the operator’s hay stack
| Ravishankar Borgaonkar, Nico Golde, Kevin Redon | #network-pentesting#identity-theft#firmware-analysis |
| 2011-02-25 | Talk | Nullcon |
Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower
| Hari Krishna Prasad Vemuru | #evm#red-teaming#hardware-embedded+3 |
| 2010-10-29 | Talk | T2 |
Hacking Femtocells
| Ravishankar Borgaonkar, Kevin Redon | #reverse-engineering#device-security#hardware-embedded+3 |
| 2009-12-05 | Talk | Clubhack |
Indian IT Act 2000 vs 2009
| Rohas Nagpal | #cyber-law#embedded-systems#firmware-analysis+4 |
| 2009-11-17 | Talk | Securitybyte |
Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors
| Nitin Kumar, Vipin Kumar | #windows#red-teaming#boot-sector+1 |