🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Embedded Security

12
Total Entries
16
Contributors

Top Contributors

Aditya Gupta(1) Anirban Chakraborty(1) Arun Mane(1) Chinmay Krishna(1) Davis Sojan(1)

All Entries (12 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-03-02TalkNullcon Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks Presentation Shyam Kumar Arshid, Chinmay Krishnaembedded-securityfirmware-analysishardware-security+3
2024-11-21TalkDeepsec Hacking with Physics v2.0 Hrishikesh Somchatwarindustrial-control-systems-securityembedded-securityfirmware-analysis+3
2024-04-19TalkBlackhat Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems Presentation Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyayembedded-securityfirmware-analysisvulnerability-management+2
2023-08-06TalkC0c0n A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things Video Panchami V, Mahima Mary Mathewsauthenticationprivacyembedded-security+1
2022-09-24TalkC0c0n Introduction to RFID/NFC Hacking Davis Sojanembedded-securityfirmware-analysishardware-security+3
2022-05-18TalkCan Sec West Launching EMUX - A framework for emulating ARM and MIPS IoT Devices Presentation Source Code Saumil Shahfirmware-analysisreverse-engineeringembedded-security+1
2021-11-12TalkC0c0n IoT Security Guidelines & Standards Yashodhan Vivek Mandkeembedded-securityiot-device-managementiot-security-testing+3
2019-11-09TalkToor Con 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringhardware-reverse-engineeringvulnerability-management+3
2018-10-05TalkC0c0n Cybersecurity Embedded Digital Transformation - The Future Sunil Kanchiembedded-securitysecurity-architectureindustrial-control-systems-security
2018-08-09TalkDefcon Backdooring DVR/NVR devices Arun Manehardware-reverse-engineeringembedded-securitypentesting+3
2017-11-14TalkBlackhat Pwning a Smart Home in Under 10 Minutes Presentation Aditya Guptaiot-pentestingembedded-securitypentesting+3
2017-08-04TalkSha Attacking OpenSSL using Side-channel Attacks: The RSA case study Whitepaper Praveen Vadnalareverse-engineeringvulnerability-managementsecurity-architecture+1