🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

IoT Security

Security for Internet of Things devices

64
Total Entries
53
Contributors
57
Unique Tags
32
Related Tags

Top Contributors

Aseem Jakhar(7) Aditya K Sood(4) Arun Mane(4) Jatin Kataria(4) Amey Gat(3)

Related Tags (12)

Show all 12 tags...

All Entries (64 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07TalkBlackhat Uncovering ‘NASty’ 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing Kanika Guptareverse-engineeringfirmware-analysismobile-security+2
2025-03-02TalkNullcon Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks Presentation Shyam Kumar Arshid, Chinmay Krishnaembedded-securityfirmware-analysishardware-security+3
2024-11-28TalkBlackhat A Tale of Pwning 500+ Vehicle Anti-theft Devices Umair Nehrimobile-securityvulnerability-assessmentiot-pentesting+1
2024-11-21TalkDeepsec Hacking with Physics v2.0 Hrishikesh Somchatwarindustrial-control-systems-securityembedded-securityfirmware-analysis+3
2024-08-10TalkDefcon Compromising an Electronic Logging Device and Creating a Truck2Truck Worm Presentation Rik Chatterjeeeldiot
2024-04-19TalkBlackhat Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems Presentation Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyayembedded-securityfirmware-analysisvulnerability-management+2
2024-04-18Tool demoBlackhat Genzai - The IoT Security Toolkit Source Code Umair Nehriiot
2023-08-10TalkDefcon Wheels of Wonder: Unveiling Car Hacking Poetry Presentation Video Hrishikesh Somchatwarfirmware-analysisreverse-engineeringautomotive-cybersecurity+1
2023-08-10TalkDefcon Hardware Backdooring an e-Scooter Arun Manereverse-engineeringindustrial-control-systems-securityvulnerability-management+2
2023-08-06TalkC0c0n A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things Video Panchami V, Mahima Mary Mathewsauthenticationprivacyembedded-security+1
2022-09-24TalkC0c0n Introduction to RFID/NFC Hacking Davis Sojanembedded-securityfirmware-analysishardware-security+3
2022-05-18TalkCan Sec West Launching EMUX - A framework for emulating ARM and MIPS IoT Devices Presentation Source Code Saumil Shahfirmware-analysisreverse-engineeringembedded-security+1
2021-11-18TalkHackinparis {Internet of Things or Threats}: Anatomizing the Structure of IoT Botnets Video Aditya K Soodiot
2021-11-12TalkC0c0n IoT Security Guidelines & Standards Yashodhan Vivek Mandkeembedded-securityiot-device-managementiot-security-testing+3
2021-08-06TalkDefcon Defending IoT in the Future of High-Tech Warfare Video Harshit Agrawalvulnerability-managementiot-pentestingsecurity-architecture+1
2021-08-05TalkBlackhat PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors Presentation Hareesh Khattri, Nagaraju N Kodalapurahardware-embedded
2020-10-07TalkRootcon Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Presentation Video Kaustubh Padwadiotredteampentest+1
2020-10-02TalkBlackhat Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale Presentation Whitepaper Video Aravind Machiryembedded-systems
2020-10-01Tool demoBlackhat Wi-Fi Access Point Rootkits Nishant Sharma, Jeswin Mathaiwifinetworkblueteam+1
2020-09-18TalkC0c0n All about IOT Forensics Hima Bindu Vejellaiotforensic
2020-09-18TalkC0c0n Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Video Kaustubh Padwadredteamiotpentest
2020-09-18TalkC0c0n Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux Munawwar Hussain Sheliareverse-engineeringiot
2020-03-18TalkCan Sec West The ARM-X Firmware Emulation Framework Presentation Source Code Saumil Shahredteamarmfirmware+5
2019-11-09TalkToor Con 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringhardware-reverse-engineeringvulnerability-management+3
2019-10-16Tool demoHitb Sec Conf Introducing ARM-X - The ARM IoT Firmware Emulation Framework Presentation Source Code Video Saumil Shaharmiotlinux
2019-10-14TalkHitb Sec Conf IoT Pentesting The Right Way Presentation Video Yogesh Ojhaiotpentest
2019-10-11TalkTexas Cyber Summit Exploit The State of Embedded Web Security in IoT Devices ! Aditya K Soodiot
2019-09-27TalkC0c0n Defense in Depth for Embedded Systems Presentation Jiggyasu Sharmaembedded-systemsblueteam
2019-09-23TalkRootcon Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking Video Arun Maneiotredteamics
2019-08-09Tool demoDefcon EXPLIoT - IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmaliotpentestredteam+2
2019-08-09TalkDefcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringvulnerability-managementsecurity-architecture+2
2019-08-09Tool demoDefcon Srujan: Safer Networks for Smart Homes Source Code Sanket Karpe, Parmanand Mishrasmart-devicesAutomationnetwork+2
2019-08-08Tool demoBlackhat EXPLIoT: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmaliotpentestredteam+2
2019-08-08Tool demoBlackhat RWDD: Remote Web Deface Detection Tool Source Code Video K v Prashantwebiotblueteam
2019-05-21TalkPhdays Rapid hardware hacking 101 Arun Mageshhardwareredteamiot
2019-05-10TalkHitb Sec Conf HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR Presentation Video Himanshu Mehta, Harshit Agrawalnetworkrfiot+1
2019-02-28TalkNullcon Building Hardened IoT Implementations with LangSec Video Prashant Anantharamaniotblueteamsecure-development
2018-11-02TalkHackfest Exploiting Connected Medical Devices: Lessons Learned & Data Earned Video Saurabh Harithealthcareredteamiot+1
2018-10-05TalkC0c0n Cybersecurity Embedded Digital Transformation - The Future Sunil Kanchiembedded-securitysecurity-architectureindustrial-control-systems-security
2018-09-27TalkRootcon Expl-iot: Hacking IoT like a boss Presentation Video Aseem Jakhariotredteam
2018-08-12Tool demoDefcon Expl-iot—IoT Security Testing and Exploitation framework Source Code Aseem Jakhariotpentestredteam+2
2018-08-09TalkDefcon Backdooring DVR/NVR devices Arun Manehardware-reverse-engineeringembedded-securitypentesting+3
2018-08-08Tool demoBlackhat Expl-iot: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhariotpentestredteam+2
2018-07-21TalkHope Evidential Study of IoT Botnets - The Bad and The Ugly! Video Aditya K Soodiot
2018-03-22TalkBlackhat Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables Presentation Video Sumanth Naropanth, Kavya Racharlawearablesblueteamredteam+2
2017-12-06TalkBlackhat BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES Presentation Video Saurabh Harithealthcareredteamiot
2017-12-06Tool demoBlackhat EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK Source Code Aseem Jakhariotpentestredteam+2
2017-11-14TalkBlackhat Pwning a Smart Home in Under 10 Minutes Presentation Aditya Guptaiot-pentestingembedded-securitypentesting+3
2017-10-05TalkVirus Bulletin The router of all evil: more than just default passwords and silly scripts Presentation Whitepaper Video Himanshu Anandvulnerability-managementreverse-engineeringpentesting+1
2017-08-18TalkC0c0n CoAP versus MQTT: IoT Protocol Vulnerability analysis Rajiv Pandeyiotpentest
2017-08-18TalkC0c0n Hacking Homes: A hardware insight for IoT [in]Security Jiggyasu Sharmaiotredteam
2017-08-18TalkC0c0n The Internet Of Things: Essentials of Secur(IOT)y Arpit Bajpai, Ronald Michaeliotblueteam
2017-08-04TalkSha Attacking OpenSSL using Side-channel Attacks: The RSA case study Whitepaper Praveen Vadnalareverse-engineeringvulnerability-managementsecurity-architecture+1
2017-07-27TalkDefcon ICS Humla Presentation Video Sneha Rajguru, Arun Maneics-securityindustrial-control-systems-securitypentesting+2
2017-04-14TalkHitb Sec Conf COMMSEC: IoT Hacking Simplified Presentation Source Code Video Aseem Jakhariotredteam
2016-11-04Tool demoBlackhat Firmware Analysis Toolkit (FAT) Source Code Aditya Guptafirmwareanalysisiot+1
2016-08-19TalkC0c0n Attacking and crashing IOT devices via Bluetooth LE Protocol Presentation Pratap Chandra Allena, Ajay Pratap Singhiotbluetoothnetwork+1
2016-08-05TalkDefcon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Jatin Katariareverse-engineeringhardware-reverse-engineeringfirmware-analysis+3
2016-06-18TalkRecon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Presentation Video Jatin Katariareverse-engineeringhardware-reverse-engineeringfirmware-analysis+3
2016-03-11TalkNullcon Physical Lock Security Amey Gat, Swapnil Wadwalkarpentestingreverse-engineeringvulnerability-management+1
2015-11-05TalkGround Zero Summit Sanctioned to Hack: Your SCADA HMIs Belong to Us! Aditya K Soodics-securityweb-securityvulnerability-management+3
2014-02-14TalkNullcon Null Hardware Badge 101 (Desi Jugaad) Presentation Video Amey Gat, Umeshiot
2013-11-07TalkGround Zero Summit Serial killing of embedded systems Atul Alexembedded-systems
2012-02-15TalkNullcon Teensy for fun and jugaad Amey Gatiot