Главная
Study mode:
on
1
Intro
2
Insecurity of Things
3
Things will look a little different...
4
Unique CIA Characteristics
5
A Case Study
6
What do we know? (Recon)
7
Live Assessment
8
Hardware Tricks: Identifying Pins
9
Useful UART
10
Fuzzing/Debugging
11
Advanced Techniques
12
Summary of Bugs
Description:
Explore the unique challenges of assessing embedded devices and Internet of Things (IoT) security in this 34-minute conference talk from BSidesSF 2017. Delve into the specific constraints of threat modeling for these tightly integrated systems, which often lack traditional host-based security controls. Follow along as the speaker conducts a live assessment of a VoIP phone, demonstrating practical techniques such as hardware pin identification, UART analysis, fuzzing, and debugging. Learn about potential mitigations for devices that cannot be easily updated, and gain insights into the distinct confidentiality, integrity, and availability characteristics of embedded systems. Discover how to approach security assessments for the growing number of connected devices on your network.

Assessing the Embedded Devices On Your Network

Security BSides San Francisco
Add to list
0:00 / 0:00