Quick Look: RF Exploitation: IoT and OT Hacking with Software-Defined Radio

What do the Dallas tornado siren attack, hacked electric skateboards, and insecure smart door locks have in common? Vulnerable wireless protocols. The number of IoT devices is growing at an alarming rate. Many of these devices go unnoticed. The problem is that the software used by many of these devices lack basic security measures that we take for granted in regular computer software. Furthermore, security advisories are almost non-existent for IoT. Exploration and use of software-defined radio to exploit the world we live in, full of interconnected devices, which makes convenient to keep remote things at fingertips. During this talk I will set the stage for how IoT is dramatically increasing the attack surface available to threat actors, what different steps are involved in RF attacks, how IoT devices have already been utilized for attacks (such as the Mirai botnet), how difficult it can be to fix IoT security issues as well as illustrating some changes that need to happen in the industry to enable us to securely use IoT going forward by eliminating top Internet of Radio Vulnerabilities.



Harshit Agrawal Security Researcher, MIT Academy of Engineering, SPPU


Himanshu Mehta Team Lead (Senior Threat Analysis Engineer), Symantec

← View more Videos

This document was retrieved from on Thu, 23 May 2019 07:50:43 -0400.