| 2025-03-02 | Talk | Nullcon |
Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks
| Shyam Kumar Arshid, Chinmay Krishna | #embedded-security#firmware-analysis#secure-coding+1 |
| 2024-11-21 | Talk | Deepsec |
Hacking with Physics v2.0
| Hrishikesh Somchatwar | #ics-security#embedded-security#firmware-analysis+2 |
| 2024-04-19 | Talk | Blackhat |
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | #embedded-security#firmware-analysis#architecture+1 |
| 2023-08-06 | Talk | C0c0n |
A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things
| Panchami V, Mahima Mary Mathews | #authentication#data-protection#embedded-security |
| 2022-09-24 | Talk | C0c0n |
Introduction to RFID/NFC Hacking
| Davis Sojan | #embedded-security#firmware-analysis#security-assessment+1 |
| 2022-05-18 | Talk | Cansecwest |
Launching EMUX - A framework for emulating ARM and MIPS IoT Devices
| Saumil Shah | #firmware-analysis#reverse-engineering#embedded-security |
| 2021-11-12 | Talk | C0c0n |
IoT Security Guidelines & Standards
| Yashodhan Vivek Mandke | #embedded-security#iot-device-management#iot-security-testing+3 |
| 2020-11-11 | Talk | Powerofcommunity |
Arbitrary code execution on RISC-V using fault injection
| Praveen Vadnala, Nils Wiersma | #fault-injection#embedded-security#firmware-analysis+1 |
| 2019-11-09 | Talk | Toorcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Ang Cui | #reverse-engineering#hardware-reverse-engineering#architecture+2 |
| 2019-10-11 | Talk | Texascybersummit |
Exploit The State of Embedded Web Security in IoT Devices !
| Aditya K Sood | #iot-security-testing#web-security#embedded-security |
| 2019-09-27 | Talk | C0c0n |
Defense in Depth for Embedded Systems
| Jiggyasu Sharma | #embedded-systems#blueteam#hardware-embedded+4 |
| 2019-05-28 | Talk | Securityfest |
RF Exploitation: Demystifying IoT/OT hacks with SDR
| Himanshu Mehta, Harshit Agrawal | #rf#iot-pentesting#operational-technology+1 |
| 2018-11-08 | Talk | Defcamp |
Backdooring DVR/NVR devices
| Arun Mane | #hardware-reverse-engineering#embedded-security#security-assessment+2 |
| 2018-10-05 | Talk | C0c0n |
Cybersecurity Embedded Digital Transformation - The Future
| Sunil Kanchi | #embedded-security#architecture#ics-security |
| 2017-11-14 | Talk | Blackhat |
Pwning a Smart Home in Under 10 Minutes
| Aditya Gupta | #iot-pentesting#embedded-security#security-assessment+2 |
| 2017-08-17 | Talk | Usenix |
BootStomp: On the Security of Bootloaders in Mobile Devices
| Aravind Machiry, Dipanjan Das, Nilo Redini, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvali, Christopher Kruegel, Giovanni Vigna | #firmware-analysis#embedded-security#binary-analysis+1 |
| 2017-08-04 | Talk | Sha |
Attacking OpenSSL using Side-channel Attacks: The RSA case study
| Praveen Vadnala, Lukasz Chmielewski | #reverse-engineering#architecture#embedded-security |
| 2017-02-14 | Talk | Rsac |
Side-Channel Resistant Implementations
| Praveen Vadnala | #side-channel-attacks#embedded-security#encryption |
| 2013-11-07 | Talk | Groundzerosummit |
Serial killing of embedded systems
| Atul Alex | #embedded-systems#hardware-embedded#firmware-analysis+1 |