Menu

Embedded Exploitation Party Trick

  • Tuesday, April 21, 2015 | 2:20 PM – 3:10 PM | West | Room: 2002

View all Sessions

We present a set of vulnerabilities found within ubiquitous embedded devices in the last year and demonstrate how they can be exploited by an attacker, armed with nothing more than a simple text editor. We'll discuss the realistic state of embedded insecurity in the world and present a practical guide for embedded defense in the enterprise.

Participants

This document was retrieved from https://www.rsaconference.com/events/us15/agenda/sessions/1985/embedded-exploitation-party-trick on Fri, 09 Dec 2016 10:24:20 -0500.
© 2016 EMC Corporation. All rights reserved.