1. Moscone South

5G networks will bring a newfound interest in attacking IoT devices by threat actors. Our fear of botnets has typically centered around DDoS attacks, but we see a shifting trend toward using IoT devices as a breach vector or an exfiltration path. This session will demonstrate the effectiveness of dynamic analysis of ARM and MIPS binaries when combined with static features and network services.

Pre-Requisites: Generally familiar with malware detection methods and some networking services. Some experience with machine learning concepts.

Participants: