Embedded Exploitation Party Trick

  • Tuesday, April 21, 2015 | 2:20 PM – 3:10 PM | West | Room: 2002

View all Sessions

We present a set of vulnerabilities found within ubiquitous embedded devices in the last year and demonstrate how they can be exploited by an attacker, armed with nothing more than a simple text editor. We'll discuss the realistic state of embedded insecurity in the world and present a practical guide for embedded defense in the enterprise.


This document was retrieved from on Sun, 22 Oct 2017 22:35:57 -0400.
© 2017 EMC Corporation. All rights reserved.