Embedded Exploitation Party Trick

  • Tuesday, April 21, 2015 | 2:20 PM – 3:10 PM | West | Room: 2002

View all Sessions

We present a set of vulnerabilities found within ubiquitous embedded devices in the last year and demonstrate how they can be exploited by an attacker, armed with nothing more than a simple text editor. We'll discuss the realistic state of embedded insecurity in the world and present a practical guide for embedded defense in the enterprise.


This document was retrieved from on Sat, 20 Jul 2019 22:27:23 -0400.