Through the Eyes of the Attacker: Designing Embedded Systems Exploits for Industrial Control Systems |
DEF CON 26
|
Analyzing & Breaking Exploit Mitigations and PRNGs on QNX for Automotive, Industrial, Medical and other Embedded Systems |
Black Hat Asia 2018
|
Dissecting QNX - Analyzing & Breaking QNX Exploit Mitigations and Secure Random Number Generators |
OffensiveCon 2018
|
Analyzing & Breaking QNX Exploit Mitigations and PRNGs |
CanSecWest 2018
|