YoVDO

Infrared - Old Threat Meets New Devices

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Cybersecurity Courses Open Source Hardware Courses

Course Description

Overview

Explore the resurgence of infrared technology as a potential security threat in modern smart devices during this 30-minute conference talk from the Hack In The Box Security Conference. Delve into the technical background of devices still utilizing infrared control interfaces and analyze their hardware designs and instructions. Discover how new devices with infrared-related components, such as face recognition systems and night vision cameras, can be exploited despite not being designed for control purposes. Witness live demonstrations of how infrared fill lights in internet-connected surveillance cameras can be used to illegally control home devices, and learn about a custom-designed gadget for capturing and relaying IR control signals. Examine the potential for smartphones to record IR control codes through their CMOS sensors and slow-motion video capabilities. Discuss the implications for privacy and security in smart homes, and consider future developments in this field, including potential tracing technologies for video recording.

Syllabus

Introduction
Review of existing technology
Why 940nm IR
Remote Controllers
Raspberry Pi
Galaxy X10
Infrared camera
LED light
Digital store
Main control board
What we dont know
FPGA head
Receiving module
Remote control code
Feeling light
Power test
Attack scenarios
Remote control demo
Internet connected TV
Amsterdam
Photo resistance
The bright side
kaspersky commercial
future works
facial detection
Key takeaways
Outro


Taught by

Hack In The Box Security Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network