🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Ics Security

Focus Area: 🏭 Industrial Control Systems Security
63
Total Entries
64
Contributors

Top Contributors

Amol Sarwate(7) Arun Mane(6) Harshit Agrawal(4) Aditya K Sood(3) Season Cherian(3)

All Entries (63 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-04-03Tool demoBlackhat R0fuzz: A Collaborative Fuzzer Source Code Season Cherian, Anikait Panigrahi, Aparna Balaji#fuzzing#ics-security#industrial-control-systems+2
2025-03-02TalkNullcon Satellite Communications: Analyzing and Protecting Space-Based Assets Video Drishti Jain#network-pentesting#ics-security#encryption+4
2025-03-01PanelNullcon Converging IT and OT Security: Unified strategies for protection, detection and response Burgess Cooper, Kuldeep Singh, Shailendra Fuloria, Rohit Sharma, Sachin Burman, Yask Sharma#ics-security#cloud-workload-protection#security-strategy+1
2024-11-21TalkDeepsec Hacking with Physics v2.0 Hrishikesh Somchatwar#ics-security#embedded-security#firmware-analysis+2
2024-11-15TalkC0c0n Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate Video Kartik Lalan#automotive-cybersecurity#reverse-engineering#security-assessment+1
2024-11-15PanelC0c0n The Pager Attack: A Wake-Up Call for Global Cyber Defense Strategies Aseem Jakhar, M Nagarajan, Tarun Wig, Philip Varughese Vayarakunnil, Nikhil Shrivastava#cyber-warfare#critical-infrastructure#ics-security
2024-10-23Tool demoBlackhat R0fuzz: A Collaborative Fuzzer Source Code Season Cherian, Vishnu Dev, Vivek N J#fuzzing#ics-security#industrial-control-systems+1
2024-08-10TalkDefcon Compromising an Electronic Logging Device and Creating a Truck2Truck Worm Presentation Rik Chatterjee, Jake Jepson#eld#embedded-systems#ics-security+3
2024-08-08Tool demoBlackhat ICSGoat: A Damn Vulnerable ICS Infrastructure Source Code Shantanu Kale, Divya Nain#ics-security#scada#plc-security+2
2024-04-19TalkBlackhat China’s Military Cyber Operations: Has the Strategic Support Force Come of Age? Presentation Pukhraj Singh#ics-security#risk-management#architecture
2024-04-19TalkBlackhat Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems Presentation Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay#embedded-security#firmware-analysis#architecture+1
2024-04-18Tool demoBlackhat R0fuzz Source Code Season Cherian, Vishnu Dev#fuzzing#ics-security#ics+2
2024-03-11TalkNullcon Hacking Trains Presentation Jaden Furtado#hacking#ics-security#network-forensics+2
2023-09-23TalkNullcon Journey in setting up OT SOC Presentation Ramandeep Singh Walia#soc#ics-security#threat-detection+1
2023-09-23PanelNullcon THREAT INTEL SHARING IN OT COMMUNITY AND INDUSTRY Ramandeep Singh Walia, Yask Sharma, Sanjeev Sharma, Britto Sidhan, Rohit Sharma#ics-security#cyber-war#intelligence-sharing+3
2023-08-24TalkHitbsecconf Hardware Backdooring an eScooter Video Arun Mane#reverse-engineering#ics-security#automotive-cybersecurity
2023-08-10TalkDefcon Attacking Vehicle Fleet Management Systems Presentation Video Yashin Mehaboobe#automotive-cybersecurity#ics-security#embedded-systems+4
2023-08-10TalkDefcamp Hardware Backdooring an e-Scooter Video Arun Mane#reverse-engineering#ics-security#automotive-cybersecurity
2023-08-07TalkC0c0n Exploring Threats in Operational Technology Manjunath Hiregange#ics-security#operational-technology#threat-hunting+1
2023-08-07TalkC0c0n Trust Resiliency - A Lesson Learned from Russia Ukraine War Video Ajit Hatti#incident-management#architecture#risk-management+1
2022-12-08Tool demoBlackhat Industrial Control Systems: Capture the Train! Dhruv Sharan, Arnaud Soullié#ctf#ics-security#plc-security+3
2022-09-28TalkRootcon Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations Harshit Agrawal#ics-security#architecture#risk-management
2022-09-24TalkC0c0n CANalyse: A Vehicle Network Analysis and Attack Tool Kartheek Lade#network-pentesting#network-traffic-analysis#can-bus+1
2022-09-23TalkC0c0n Cybersecurity for Manufacturing Santhosh Srinivasan#ics-security#control-systems#critical-infrastructure+2
2022-08-14TalkDefcon Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right Vivek Ponnada#ics-security#risk-management#architecture+1
2022-05-12TalkBlackhat Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems Presentation Prashant Rajput, Michail Maniatakos#ics-security#control-systems#hardware-embedded+3
2021-11-19TalkHackfest Hacking with Physics Hrishikesh Somchatwar#ics-security#automotive-cybersecurity#embedded-systems+4
2021-11-13TalkC0c0n A look into cyber-espionage activities targeting critical infrastructure in India Saurabh Sharma, Kurt Baumgartner#ics-security#critical-infrastructure#threat-hunting+1
2021-11-13TalkC0c0n Cyber Warfare & Securing Critical Infrastructures Faruk Kazi#critical-infrastructure#ics-security#incident-management+1
2021-11-13TalkC0c0n Securing OT in O&G Industry George Eapen#ics-security#control-systems#critical-infrastructure
2021-11-12TalkC0c0n ICS Security —- A need, a challenge and a new change in Mindset Dhruv Gupta#ics-security#critical-infrastructure#control-systems+1
2021-10-13TalkRootcon The Kill Chain: Future of Cyber in Defense Video Harshit Agrawal#architecture#ics-security#risk-management
2021-08-26TalkHitbsecconf Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade Presentation Video Harshit Agrawal#ics-security#architecture#risk-management
2021-08-08TalkDefcon Top 20 Secure PLC Coding Practices Video Vivek Ponnada, Sarah Fluchs#ics-security#secure-coding#control-systems+1
2021-08-06TalkDefcon Defending IoT in the Future of High-Tech Warfare Video Harshit Agrawal#iot-pentesting#architecture#ics-security
2021-05-07Tool demoBlackhat CANalyse: A Vehicle Network Analysis and Attack Tool Source Code Kartheek Lade#automobile#car-hacking#iot-device-management+4
2020-10-07TalkRootcon How I Pwned the ICS data during my internship Presentation Shail Patel#ics#red-teaming#ics-security+1
2019-09-27TalkC0c0n Hacking ICS devices for Fun Arun Mane#red-teaming#ics-security#exploit-delivery+1
2019-09-27TalkC0c0n Industry 4.0 - Security and Compliance Santhosh Srinivasan#ics-security#security-compliance#security-governance+2
2019-09-27TalkC0c0n Looking a decade ahead: Big data, drones , Robots and cyber security. Rahul Sasi#ics-security#architecture#ai-security+2
2019-09-23TalkRootcon Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking Video Arun Mane#red-teaming#ics#ics-security+3
2019-08-08TalkDefcon Hacking ICS devices for Fun Penetration Testing of Vehicle Components Video Arun Mane#automotive-cybersecurity#can-bus#ics-security+2
2019-03-02PanelNullcon CISO Strategy for OT and IoT risk and Threat Management Video Gaurav Shukla, Gomeet Pant, Rakesh Viswanathan, Sudarshan Rajagopal#ics-security#iot-pentesting#cybersecurity-strategy+3
2019-03-01PanelNullcon Clear and Present Danger: Cyber Wars will Target Critical Infrastructure Video Sourabh Issar, Sachin Burman, Sudarshan Rajagopal, Somenath Kundu#cyber-war#critical-infrastructure#security-strategy+1
2018-10-05TalkC0c0n Cybersecurity Embedded Digital Transformation - The Future Sunil Kanchi#embedded-security#architecture#ics-security
2018-10-05TalkC0c0n Future of Mobility & Cyber Security Suja Chandy#automotive-cybersecurity#ics-security#architecture+2
2017-07-27TalkDefcon ICS Humla Presentation Video Sneha Rajguru, Arun Mane#ics-security#security-assessment#embedded-systems+4
2017-03-03TalkNullcon Securing Critical National Infrastructure Video Shailendra Fuloria, R Sarangapani, Rahul Tongia, Michael Pyle, Justin Searle#critical-infrastructure#ics-security#risk-management+3
2016-08-04TalkBlackhat Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages Video Anirudh Duggal#ics-security#risk-management#application-pentesting+3
2015-11-05TalkGroundzerosummit Sanctioned to Hack: Your SCADA HMIs Belong to Us! Aditya K Sood#ics-security#web-security#firmware-analysis+2
2015-09-25TalkAppsecusa The State of Web Application Security in SCADA Web Human Machine Interfaces (HMIs)! Aditya K Sood#scada#hmi#web-security+1
2014-11-13TalkGroundzerosummit SCADA Exploitation through Firmware Ashish Saxena#red-teaming#firmware-analysis#ics-security+3
2014-08-07Tool demoBlackhat C-SCAD: Assessing Security flaws in clearscada Web_X client! Presentation Source Code Aditya K Sood#red-teaming#security-assessment#ics-security+3
2014-02-14TalkNullcon 2014 The year in which we cannot ignore SCADA Presentation Video Amol Sarwate#scada#blueteam#ics-security+4
2013-11-21TalkDeepsec Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy Video Parth Shukla#botnet#telnet#network-architecture+3
2013-11-20TalkAppsecusa Why is SCADA Security an Uphill Battle? Video Amol Sarwate#scada#application-pentesting#application-hardening+4
2013-03-15TalkBlackhat Vulnerability analysis of 2013 SCADA issues Presentation Video Amol Sarwate#scada#ics-security#attack-surface+2
2012-12-01TalkClubhack Smart Grid Security Presentation Video Falgun Rathod#blueteam#critical-infrastructure#cyber-physical-systems+2
2012-11-23TalkMalcon Tampering in Energy Meters Presentation Mohit Arora#energy-theft#embedded-systems#firmware-analysis+2
2012-03-15TalkHackinparis SCADA Security: Why Is It So Hard ? Video Amol Sarwate#ics-security#scada#control-systems+2
2012-03-15TalkGrrcon SCADA Security: Why is it so hard? Video Amol Sarwate#scada#ics-security#authentication+2
2012-02-15TalkNullcon SCADA Security: Why is it so hard Amol Sarwate#scada#ics-security#control-systems+1
2011-12-14TalkBlackhat SCADA Security - Why Is It So Hard? Presentation Whitepaper Source Code Amol Sarwate#scada#ics-security#control-systems+1