🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Firmware Analysis

Focus Areas: 🔧 Hardware Security 📡 IoT Security 🔬 Reverse Engineering
72
Total Entries
66
Contributors

Top Contributors

Jatin Kataria(7) Aseem Jakhar(6) Saumil Shah(4) Hrishikesh Somchatwar(3) Kartheek Lade(3)

All Entries (72 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-04-04Tool demoBlackhat CompartIoT Source Code Sreesankar S, Aditya Krishna Vinod, Season Cherian#microcontrollers#hardware-embedded#firmware-analysis+2
2025-04-03Tool demoBlackhat CompartIoT Source Code Sreesankar S, Aditya Krishna Vinod, Season Cherian#microcontrollers#hardware-embedded#firmware-analysis+2
2025-03-02TalkNullcon Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks Presentation Shyam Kumar Arshid, Chinmay Krishna#embedded-security#firmware-analysis#secure-coding+1
2025-03-02PanelNullcon Tackling Automotive Hardware Vulnerabilities Aseem Jakhar, Sachin Jain, Adam Laurie#automotive-cybersecurity#embedded-systems#hardware-embedded+3
2024-12-12Tool demoBlackhat Genzai - The IoT Security Toolkit Source Code Umair Nehri#genzai#iot-device-management#iot-pentesting+4
2024-11-21TalkDeepsec Hacking with Physics v2.0 Hrishikesh Somchatwar#ics-security#embedded-security#firmware-analysis+2
2024-11-21TalkSecurityfest Wheels of Wonder Video Hrishikesh Somchatwar#automotive-cybersecurity#car-hacking#embedded-systems+4
2024-08-10TalkDefcon Compromising an Electronic Logging Device and Creating a Truck2Truck Worm Presentation Rik Chatterjee, Jake Jepson#eld#embedded-systems#ics-security+3
2024-04-19TalkBlackhat Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems Presentation Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay#embedded-security#firmware-analysis#architecture+1
2024-04-18TalkBlackhat The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition Presentation Arun Kanuparthi, Hareesh Khattri, Jeyavijayan Jv Rajendran, Jason Fung, Ahmad Reza Sadeghi#hacking#embedded-systems#ctf+1
2024-03-11TalkNullcon Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC Presentation Video Arpan Jati#vulnerability-assessment#embedded-systems#firmware-analysis
2023-09-23TalkNullcon Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers Presentation Video Rishit Bansal#reverse-engineering#linux#firmware-analysis
2023-08-10TalkDefcon Attacking Vehicle Fleet Management Systems Presentation Video Yashin Mehaboobe#automotive-cybersecurity#ics-security#embedded-systems+4
2023-08-10TalkDefcon Wheels of Wonder: Unveiling Car Hacking Poetry Presentation Video Hrishikesh Somchatwar#firmware-analysis#reverse-engineering#automotive-cybersecurity
2023-05-11Tool demoBlackhat CANalyse 2.0 : A Vehicle Network Analysis and Attack Tool Source Code Kartheek Lade#automobile#car-hacking#iot-device-management+4
2022-09-24TalkC0c0n Introduction to RFID/NFC Hacking Davis Sojan#embedded-security#firmware-analysis#security-assessment+1
2022-09-06PanelNullcon IoT Supply Chain Blues and the way forward Video Aseem Jakhar, Kedar Sovani, Anantharaman Iyer, Suvabrata Sinha, Sudarshan Rajagopal, Sachin Jain#iot-device-management#iot-pentesting#supply-chain-security+3
2022-08-10Tool demoBlackhat CANalyse (2.0): A vehicle network analysis and attack tool Source Code Kartheek Lade, Rahul Jeyasingh#automobile#car-hacking#iot-device-management+4
2022-05-18TalkCansecwest Launching EMUX - A framework for emulating ARM and MIPS IoT Devices Presentation Source Code Saumil Shah#firmware-analysis#reverse-engineering#embedded-security
2022-05-12TalkBlackhat Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems Presentation Prashant Rajput, Michail Maniatakos#ics-security#control-systems#hardware-embedded+3
2021-11-12TalkC0c0n IoT Security Guidelines & Standards Yashodhan Vivek Mandke#embedded-security#iot-device-management#iot-security-testing+3
2021-08-05TalkBlackhat PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors Presentation Hareesh Khattri, Nagaraju N Kodalapura, Nam N Nguyen#hardware-embedded#endpoint-protection#incident-management+1
2021-05-07Tool demoBlackhat CANalyse: A Vehicle Network Analysis and Attack Tool Source Code Kartheek Lade#automobile#car-hacking#iot-device-management+4
2021-03-05TalkNullcon Arbitrary code execution on RISC-V using fault injection Video Praveen Vadnala, Nils Wiersma#code-analysis#hardware-embedded#embedded-systems+1
2020-11-11TalkPowerofcommunity Arbitrary code execution on RISC-V using fault injection Praveen Vadnala, Nils Wiersma#fault-injection#embedded-security#firmware-analysis+1
2020-10-02TalkBlackhat Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale Presentation Whitepaper Video Aravind Machiry, Nilo Redini, Andrea Continella, Ruoyu Wang, Yan Shoshitaishvili, Cristopher Kruegel, Giovanni Vigna, Chad Spensky#embedded-systems#firmware-analysis#static-analysis+1
2020-09-18TalkC0c0n Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Video Kaustubh Padwad#red-teaming#security-assessment#iot-device-management+4
2020-09-18TalkC0c0n Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux Munawwar Hussain Shelia#reverse-engineering#firmware-analysis#embedded-systems+4
2019-12-04TalkBlackhat Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing Presentation Whitepaper Video Karthik Ramasamy, Eric Hampshire#blueteam#smartcard#mfa+4
2019-11-09TalkToorcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Video Jatin Kataria, Ang Cui#reverse-engineering#hardware-reverse-engineering#architecture+2
2019-10-16Tool demoHitbsecconf Introducing ARM-X - The ARM IoT Firmware Emulation Framework Presentation Source Code Video Saumil Shah#arm#linux#firmware-analysis+4
2019-09-27TalkC0c0n Defense in Depth for Embedded Systems Presentation Jiggyasu Sharma#embedded-systems#blueteam#hardware-embedded+4
2019-08-09TalkDefcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Video Jatin Kataria, Rick Housley, Ang Cui#reverse-engineering#architecture#hardware-reverse-engineering+1
2019-08-09Award Thrangrycat - Pwnie Award for Most Under-Hyped Research Source Code Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#firmware-analysis+2
2019-08-08TalkBlackhat 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Presentation Video Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#exploit-delivery+3
2019-05-21TalkPhdays How to fail in hardware hacking Presentation Arun Magesh#red-teaming#embedded-systems#firmware-analysis+1
2019-05-21TalkPhdays Rapid hardware hacking 101 Arun Magesh#red-teaming#iot-pentesting#hardware-embedded+2
2019-05-09TalkHitbsecconf Make ARM Shellcode Great Again Presentation Video Saumil Shah#arm#embedded-systems#firmware-analysis+1
2018-11-08TalkDefcamp Backdooring DVR/NVR devices Video Arun Mane#hardware-reverse-engineering#embedded-security#security-assessment+2
2018-11-02TalkHackfest Exploiting Connected Medical Devices: Lessons Learned & Data Earned Video Saurabh Harit#red-teaming#wearables#iot-device-management+4
2018-10-15TalkHacklu Make ARM Shellcode Great Again Presentation Saumil Shah#arm#embedded-systems#firmware-analysis
2018-09-27TalkRootcon Expl-iot: Hacking IoT like a boss Presentation Video Aseem Jakhar#red-teaming#iot-security-testing#firmware-analysis+2
2018-03-03PanelNullcon IoT : How long till D Day? Video Aseem Jakhar, Shobha Jagathpal, Rishikesh Kamat, Daniel Cisowski, Michael Pyle#iot-device-management#iot-pentesting#embedded-systems+3
2017-12-06TalkBlackhat BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES Presentation Video Saurabh Harit#red-teaming#data-leak#identity-theft+1
2017-11-14TalkBlackhat Pwning a Smart Home in Under 10 Minutes Presentation Aditya Gupta#iot-pentesting#embedded-security#security-assessment+2
2017-10-05TalkVirusbulletin The router of all evil: more than just default passwords and silly scripts Presentation Whitepaper Video Himanshu Anand, Chastine Menrige#reverse-engineering#security-assessment#firmware-analysis
2017-08-18TalkC0c0n CoAP versus MQTT: IoT Protocol Vulnerability analysis Rajiv Pandey#security-assessment#iot-pentesting#embedded-systems+1
2017-08-18TalkC0c0n Exploiting the smartness of BLE Stack Apoorva Gupta#bluetooth#red-teaming#mobile-hacking+3
2017-08-18TalkC0c0n Hacking Homes: A hardware insight for IoT [in]Security Jiggyasu Sharma#red-teaming#hardware-embedded#firmware-analysis+2
2017-08-18TalkC0c0n The Internet Of Things: Essentials of Secur(IOT)y Arpit Bajpai, Ronald Michael#blueteam#iot-device-management#iot-pentesting+4
2017-08-17TalkUsenix BootStomp: On the Security of Bootloaders in Mobile Devices Presentation Whitepaper Video Aravind Machiry, Dipanjan Das, Nilo Redini, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvali, Christopher Kruegel, Giovanni Vigna#firmware-analysis#embedded-security#binary-analysis+1
2017-04-14TalkHitbsecconf COMMSEC: IoT Hacking Simplified Presentation Source Code Video Aseem Jakhar#red-teaming#iot-pentesting#hardware-embedded+2
2017-03-03PanelNullcon Hardware Security: Foundational Block of Cyber Battlefield Vinayak Godse, Amit Sharma, Aseem Jakhar, Minatee Mishra#hardware-embedded#firmware-analysis#embedded-systems+4
2016-11-04Tool demoBlackhat Firmware Analysis Toolkit (FAT) Source Code Aditya Gupta#firmware#security-assessment#embedded-systems+3
2016-08-05TalkDefcon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Video Jatin Kataria, Ang Cui, Francois Charbonneau#reverse-engineering#hardware-reverse-engineering#firmware-analysis+2
2016-06-18TalkRecon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Presentation Video Jatin Kataria, Ang Cui, Francois Charbonneau#reverse-engineering#hardware-reverse-engineering#firmware-analysis+2
2015-11-05TalkGroundzerosummit Sanctioned to Hack: Your SCADA HMIs Belong to Us! Aditya K Sood#ics-security#web-security#firmware-analysis+2
2015-08-01TalkC0c0n From AOSP ( Android OpenSource Project ) to ABD ( Android Based Devices ) Anto Joseph#android#mobile-device-management#embedded-systems+2
2015-08-01TalkC0c0n Reversing and Deciphering the Cyber Espionage Malware Communications Monnappa K A#reverse-engineering#decipher#malware-research+3
2014-11-13TalkGroundzerosummit Hacking consumer electronics for Fun Atul Alex#red-teaming#embedded-systems#firmware-analysis+1
2014-11-13TalkGroundzerosummit SCADA Exploitation through Firmware Ashish Saxena#red-teaming#firmware-analysis#ics-security+3
2014-10-29TalkEkoparty Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2 Presentation Video Rahul Sasi#red-teaming#dvb-c#firmware-analysis+1
2014-03-18TalkTroopers Evolution of SIM Card Security Presentation Ravishankar Borgaonkar#3gpp#gsma#embedded-systems+4
2014-02-14TalkNullcon Hacking YOu’r Cable TV Network. Video Rahul Sasi, Ahamed Nafeez#red-teaming#network-pentesting#endpoint-protection+1
2013-11-07TalkGroundzerosummit Serial killing of embedded systems Atul Alex#embedded-systems#hardware-embedded#firmware-analysis+1
2012-11-23TalkMalcon Tampering in Energy Meters Presentation Mohit Arora#energy-theft#embedded-systems#firmware-analysis+2
2011-12-15TalkBlackhat Kautilya: Teensy Beyond Shell Presentation Whitepaper Source Code Nikhil Mittal#hid#red-teaming#endpoint-protection+3
2011-08-03TalkBlackhat Femtocells: A poisonous needle in the operator’s hay stack Presentation Whitepaper Video Ravishankar Borgaonkar, Nico Golde, Kevin Redon#network-pentesting#identity-theft#firmware-analysis
2011-08-03TalkBlackhat Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS Presentation Whitepaper Video Jatin Kataria, Ang Cui, Salvatore Stolfo#cisco-ios#hardware-embedded#firmware-analysis+4
2011-02-25TalkNullcon Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower Presentation Video Hari Krishna Prasad Vemuru#evm#red-teaming#hardware-embedded+3
2009-12-05TalkClubhack Indian IT Act 2000 vs 2009 Presentation Rohas Nagpal#cyber-law#embedded-systems#firmware-analysis+4
2009-11-17TalkSecuritybyte Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors Presentation Source Code Nitin Kumar, Vipin Kumar#windows#red-teaming#boot-sector+1