Embedded Exploitation Party Trick

  • Tuesday, April 21, 2015 | 2:20 PM – 3:10 PM | West | Room: 2002

View all Sessions

We present a set of vulnerabilities found within ubiquitous embedded devices in the last year and demonstrate how they can be exploited by an attacker, armed with nothing more than a simple text editor. We'll discuss the realistic state of embedded insecurity in the world and present a practical guide for embedded defense in the enterprise.


This document was retrieved from on Thu, 20 Jun 2019 14:01:25 -0400.