1. Online

We will build upon our previous 2018 RSAC presentation “Exfiltrating Data through IoT” to show how we have applied these aberrant behaviors to machine learning algorithms. We will then demo our open source solution to uncover damaging covert channels communicating with the outside world and the types of IoT, IIoT, and ICS data being harvested along with the new attack surfaces that they offer.