Stepping P3wns: Adventures in Full Spectrum Embedded Exploitation & Defense

  • Friday, February 28, 2014 | 10:20 AM – 11:20 AM | West | Room: 3018

View all Sessions

We will present two demonstrations of exploitation and defense of embedded devices like printers, phones and routers. The first demo features an embedded worm capable of stealthy, autonomous polyspecies propagation. The second demo shows host-based embedded defense techniques, called Symbiotes, developed at Columbia University under government support and licensed to Red Balloon Security, Inc.


This document was retrieved from on Wed, 19 Jun 2019 17:25:59 -0400.