Главная
Study mode:
on
1
Introduction
2
Background
3
Invasion of IoT
4
NRF Connect
5
Medical Device
6
Bluetooth
7
Security Researchers
8
Agenda
9
IoT Ecosystem
10
Testing Methodology
11
Hacking Overview
12
Telepresence Robot
13
Cloud Pis
14
Installation Key
15
Robot Key
16
GPS Panic Button
17
Owners Manual
18
Factory Reset
19
Getting a Phone Number
20
Bounce Check
21
RealTime Tracking System
22
GPS Data
23
RealTime Tracking
24
Insteon Wink
25
Insteon Mobile App
26
Change Your Password
27
GNU Radio Companion
28
Insteon Protocol
29
Removing Flash Memory
30
Removing Memory Chips
31
Removing Firmware
32
Embedded Multimedia Controller
33
File Systems
34
Secure Boot
35
Rewrite Chip
36
Conclusion
37
Questions
Description:
Explore the world of IoT security through a comprehensive conference talk that delves into vulnerability analysis and research methodologies. Learn about the invasion of IoT devices, NRF Connect, medical device security, and Bluetooth vulnerabilities. Discover various testing methodologies and hacking techniques applied to telepresence robots, Cloud Pis, and GPS panic buttons. Examine real-time tracking systems, Insteon Wink devices, and mobile app vulnerabilities. Gain insights into GNU Radio Companion, Insteon protocols, and firmware extraction techniques. Investigate embedded multimedia controllers, file systems, secure boot processes, and chip rewriting. Enhance your understanding of IoT security challenges and solutions through this in-depth presentation.

Securing the Internet of Things - IoT Through Security Research and Vulnerability Analysis

Add to list