Embedded Exploitation Party Trick

  • Tuesday, April 21, 2015 | 2:20 PM – 3:10 PM | West | Room: 2002

View all Sessions

We present a set of vulnerabilities found within ubiquitous embedded devices in the last year and demonstrate how they can be exploited by an attacker, armed with nothing more than a simple text editor. We'll discuss the realistic state of embedded insecurity in the world and present a practical guide for embedded defense in the enterprise.


This document was retrieved from on Sun, 21 Apr 2019 08:47:12 -0400.