Stepping P3wns: Adventures in Full Spectrum Embedded Exploitation & Defense


Posted on in Videos

We will present two demonstrations of exploitation and defense of embedded devices like printers, phones and routers. The first demo features an embedded worm capable of stealthy, autonomous polyspecies propagation. The second demo shows host-based embedded defense techniques, called Symbiotes, developed at Columbia University under government support and licensed to Red Balloon Security, Inc.


Share With Your Community