Posted on
in Presentations
With a surge in the production of Internet of Things (IoT) devices, embedded development tools are becoming common and the software they run is often run in escalated modes. However, some of the embedded development tools on the market contain serious vulnerabilities that put users at risk. This talk will demonstrate this via the exploitation of a common embedded debugger.
Learning Objectives:
1: Understand the risk introduced by untested development tools.
2: Find out the current state of development tools related to embedded development.
3: Learn how to best proceed when tools cannot be trusted.
Pre-Requisites:
General understanding of the concepts behind IoT device development (the design of both hardware and software, familiarity with the concept of a debugger, etc.); general understanding of basic binary exploitation (e.g. stack-overflow, memory corruption, etc.).
Learning Objectives:
1: Understand the risk introduced by untested development tools.
2: Find out the current state of development tools related to embedded development.
3: Learn how to best proceed when tools cannot be trusted.
Pre-Requisites:
General understanding of the concepts behind IoT device development (the design of both hardware and software, familiarity with the concept of a debugger, etc.); general understanding of basic binary exploitation (e.g. stack-overflow, memory corruption, etc.).
Mobile & IoT Security Hackers & Threats
zero day vulnerability supply chain Internet of Things hackers & threats exploit of vulnerability
Topic
Mobile & IoT Security
Hackers & Threats
Subtopic
zero day vulnerability
supply chain
Internet of Things
hackers & threats
exploit of vulnerability
Share With Your Community