Through the Eyes of the Attacker: Designing Embedded Systems Exploits for Industrial Control Systems |
DEF CON 26
|
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems, Forever |
Black Hat USA 2018
|
Evil Bubbles or How to Deliver Attack Payload via the Physics of the Process |
Black Hat USA 2017
|
Man-in-the-SCADA: Anatomy of Data Integrity Attacks in Industrial Control Systems |
Black Hat Asia 2017
|
A Rising Tide: Design Exploits in Industrial Control Systems |
WOOT '16
|
Never Trust Your Inputs: Causing 'Catastrophic Physical Consequences' from the Sensor (or How to Fool ADC) |
Black Hat Asia 2016
|
Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion |
DEF CON 23
|
Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion |
Black Hat USA 2015
|
What You Always Wanted and Now Can: Hacking Chemical Processes |
HITBSecConf2015 – Amsterdam
|