YoVDO

Hacking Automatically - Applying Program Analysis to IoT

Offered By: nullcon via YouTube

Tags

nullcon Courses Reverse Engineering Courses IoT security Courses Security Vulnerabilities Courses Firmware Analysis Courses Memory Corruption Courses

Course Description

Overview

Explore program analysis techniques for vulnerability discovery in IoT devices through this conference talk from NULLCON Goa 2020. Gain insights into the challenges of analyzing firmware and identifying memory corruption bug patterns. Learn how tooling can augment security research as the speaker demonstrates finding new and previously known bugs across 20 IoT devices. Discover 20 real-world examples where this approach quickly identified security vulnerabilities across different bug classes. Benefit from Ryan Speers' extensive experience in assessing embedded devices, reversing firmware, and developing tools for security analysts and reverse engineers. Understand how to leverage automation and program analysis techniques to enhance vulnerability detection in IoT systems.

Syllabus

Hacking Automatically: Applying Program Analysis to IoT | Ryan Speers | NULLCON Goa 2020


Taught by

nullcon

Related Courses

Binder - The Bridge To Root - Hongli Han and Mingjian Zhou
Hack In The Box Security Conference via YouTube
JARVIS Never Saw It Coming - Hacking Machine Learning in Speech, Text and Face Recognition
44CON Information Security Conference via YouTube
SyScan360'16 Singapore - Memory Corruption Is For Wussies
SyScan360 via YouTube
Select Code Execution From Using SQLite
media.ccc.de via YouTube
BLEEDINGBIT - Your APs Belong to Us
Black Hat via YouTube