Главная
Study mode:
on
1
Intro
2
Thanks
3
This years talk is
4
Who am I
5
What am I talking about today
6
What is a typical corporate pen test
7
What is IoT
8
Problems with IoT
9
Examples
10
Camera Controller
11
Camera Version Firmware
12
Shodan
13
Embedded Systems
14
Dairy Farm
15
Mercedes Benz
16
School
17
Business
18
Pool
19
Jewelry Store
20
Fingerprinting Systems
21
Password Change
22
CVS Search
23
Firmware
24
Download Firmware
25
Coordinated Disclosure
26
Camera Firmware
27
Other Embedded Systems
28
Solar Panels
29
Embedded IOT
30
Smart Buildings
31
Schneider Electric
32
Schneier
33
Back Door
34
Knowledge Gap
35
Cybersecurity
36
Web Server
37
Web Apps
38
CVS
39
Whose problem is this
40
Securing smart buildings
41
Getting the basics right
42
Separation
43
Physically Secure
44
Software Decay
45
SDLC
46
Windows XP
47
Partners
48
False positives
49
Complex ecosystem
50
Internal stakeholder
51
Security is hard
52
Contact information
53
Hacking back
Description:
Explore embedded systems security in this 47-minute conference talk from GrrCON 2017. Delve into the world of Internet of Things (IoT) vulnerabilities, examining real-world examples from various industries including automotive, agriculture, and smart buildings. Learn about typical corporate penetration testing, firmware analysis, and the challenges of securing complex ecosystems. Discover the importance of coordinated disclosure, addressing knowledge gaps in cybersecurity, and implementing best practices for securing smart devices. Gain insights on partnering with stakeholders, managing false positives, and navigating the complexities of software decay and lifecycle management in embedded systems.

Embedding Security in Embedded Systems

Add to list
0:00 / 0:00