🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Hardware Embedded

Focus Areas: 🔧 Hardware Security 📡 IoT Security
35
Total Entries
41
Contributors

Top Contributors

Aseem Jakhar(3) Jatin Kataria(3) Aditya Krishna Vinod(2) Jayesh Chauhan(2) Jiggyasu Sharma(2)

All Entries (35 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-04-04Tool demoBlackhat CompartIoT Source Code Sreesankar S, Aditya Krishna Vinod, Season Cherian#microcontrollers#hardware-embedded#firmware-analysis+2
2025-04-03Tool demoBlackhat CompartIoT Source Code Sreesankar S, Aditya Krishna Vinod, Season Cherian#microcontrollers#hardware-embedded#firmware-analysis+2
2025-03-02PanelNullcon Tackling Automotive Hardware Vulnerabilities Aseem Jakhar, Sachin Jain, Adam Laurie#automotive-cybersecurity#embedded-systems#hardware-embedded+3
2024-08-10PanelDefcon Color Blasted Badge Making: How Hard Could It Be ? Abhinav Panda, Hamster, Bradan Lane#hardware-embedded#embedded-systems#hardware-hacking
2023-05-12Tool demoBlackhat Introducing the Operating System for Automotive Security Testing: A Hands-on Demonstration Source Code Ravi Rajput#automobile#automotive-cybersecurity#embedded-systems+4
2023-04-20TalkHitbsecconf BYPASSING ANTI-CHEATS & HACKING COMPETITIVE GAMES Presentation Video Rohan Aggarwal#hacking#hardware-hacking#bypassing+3
2022-05-12TalkBlackhat Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems Presentation Prashant Rajput, Michail Maniatakos#ics-security#control-systems#hardware-embedded+3
2022-03-25TalkInsomnihack Attacking Bluetooth LE design and implementation in mobile + wearables ecosystems Video Nitin Lakshmanan, Sunil Kumar 1#bluetooth#hardware-embedded#iot-pentesting+4
2022-03-24TalkInsomnihack Practical exploitation of zigbee-class networks with USB-based RF transceivers & open source software Video Nitin Lakshmanan, Sunil Kumar 1#iot-pentesting#wireless-security#hardware-hacking+3
2021-11-19TalkHackfest Hacking with Physics Hrishikesh Somchatwar#ics-security#automotive-cybersecurity#embedded-systems+4
2021-08-05TalkBlackhat PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors Presentation Hareesh Khattri, Nagaraju N Kodalapura, Nam N Nguyen#hardware-embedded#endpoint-protection#incident-management+1
2021-03-05TalkNullcon Arbitrary code execution on RISC-V using fault injection Video Praveen Vadnala, Nils Wiersma#code-analysis#hardware-embedded#embedded-systems+1
2020-09-18TalkC0c0n Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux Munawwar Hussain Shelia#reverse-engineering#firmware-analysis#embedded-systems+4
2019-12-04TalkBlackhat Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing Presentation Whitepaper Video Karthik Ramasamy, Eric Hampshire#blueteam#smartcard#mfa+4
2019-09-27TalkC0c0n Defense in Depth for Embedded Systems Presentation Jiggyasu Sharma#embedded-systems#blueteam#hardware-embedded+4
2019-08-09Award Thrangrycat - Pwnie Award for Most Under-Hyped Research Source Code Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#firmware-analysis+2
2019-08-08TalkBlackhat 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Presentation Video Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#exploit-delivery+3
2019-05-21TalkPhdays Rapid hardware hacking 101 Arun Magesh#red-teaming#iot-pentesting#hardware-embedded+2
2019-05-10TalkHitbsecconf HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR Presentation Video Himanshu Mehta, Harshit Agrawal#rf#red-teaming#hardware-embedded+3
2018-08-11Tool demoDefcon HealthyPi—Connected Health Source Code Ashwin Whitchurch#raspberry-pi#hardware-embedded#embedded-systems+4
2017-08-18TalkC0c0n Hacking Homes: A hardware insight for IoT [in]Security Jiggyasu Sharma#red-teaming#hardware-embedded#firmware-analysis+2
2017-07-27TalkDefcon ICS Humla Presentation Video Sneha Rajguru, Arun Mane#ics-security#security-assessment#embedded-systems+4
2017-04-14TalkHitbsecconf COMMSEC: IoT Hacking Simplified Presentation Source Code Video Aseem Jakhar#red-teaming#iot-pentesting#hardware-embedded+2
2017-03-03TalkNullcon Case Study on RFID (proximity cards) hacking Presentation Sarwar Jahan, Ashwath Kumar#rfid#red-teaming#hardware-embedded+4
2017-03-03PanelNullcon Hardware Security: Foundational Block of Cyber Battlefield Vinayak Godse, Amit Sharma, Aseem Jakhar, Minatee Mishra#hardware-embedded#firmware-analysis#embedded-systems+4
2015-11-05TalkGroundzerosummit Hacking RFIDs under 2000INR Jayesh Chauhan#rfid#red-teaming#hardware-embedded+4
2015-08-01TalkC0c0n Hacking RFIDs under 2000 INR Jayesh Chauhan, Divya S John#rfid#hardware-embedded#embedded-systems+3
2014-02-14TalkNullcon Null Hardware Badge 101 (Desi Jugaad) Presentation Video Amey Gat, Umesh#microcontrollers#embedded-systems#hardware-embedded
2013-11-07TalkGroundzerosummit Serial killing of embedded systems Atul Alex#embedded-systems#hardware-embedded#firmware-analysis+1
2013-03-07TalkCansecwest SMS to Meterpreter - Fuzzing USB Modems Presentation Whitepaper Rahul Sasi#red-teaming#fuzzing#hardware-embedded
2012-12-01TalkClubhack Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC Presentation Video Aditya Gupta, Subho Halder#nfc#red-teaming#android-security+4
2012-02-15TalkNullcon Open source revolution :Need Hardware - Software marriage Venkatesh#embedded-systems#hardware-embedded#open-source-security
2011-08-03TalkBlackhat Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS Presentation Whitepaper Video Jatin Kataria, Ang Cui, Salvatore Stolfo#cisco-ios#hardware-embedded#firmware-analysis+4
2011-02-25TalkNullcon Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower Presentation Video Hari Krishna Prasad Vemuru#evm#red-teaming#hardware-embedded+3
2010-10-29TalkT2 Hacking Femtocells Presentation Ravishankar Borgaonkar, Kevin Redon#reverse-engineering#device-security#hardware-embedded+3