Loading…
This event has ended. Visit the official site or create your own event on Sched.
Welcome to the Interactive Agenda for SecurityWeek’s 2017 ICS Cyber Security Conference! (View the full conference website here)  (You can register for the conference here)
View analytic
Thursday, October 26 • 9:45am - 10:30am
Radio Exploitation: Characterizing, Contextualizing, and Applying Wireless Attack Methods

Sign up or log in to save this to your schedule and see who's attending!

What do the Dallas tornado siren attack, hacked electric skateboards, and insecure smart door locks have in common?  Vulnerable wireless protocols!  Exploitation of wireless devices is growing increasingly common, thanks to the proliferation of mobile and IoT-focused RF protocols throughout both the consumer and industrial spaces.  While non-Wi-Fi and non-Bluetooth RF protocols remain a mystery to many security practitioners, exploiting them is easier than one might think.

Join us as we walk through the fundamentals of radio exploitation.  After introducing essential RF concepts, we will classify and discuss the different types of wireless attacks.  As we introduce each new attack, we will draw parallels to similar wired exploits, and highlight attack primitives that are unique to RF.  To illustrate these concepts, we will show each attack in practice with a series of live demos.

Attendees will come away from this session with an understanding of the mechanics of wireless network exploitation, an awareness of how they can bridge their IP network exploitation skills to the wireless domain, and an informed perspective on how they can better protect their own wireless systems from radio-enabled malicious actors.

Speakers
avatar for Matt Knight

Matt Knight

Software Engineer & Security Researcher, Bastille
Matt Knight (@embeddedsec) is a software engineer and security researcher at Bastille, with a background in hardware, software, and wireless security.  Matt’s research focuses on preventing exploitation of the myriad wireless networking technologies that connect embedded devices to the Internet of... Read More →
avatar for Marc Newlin

Marc Newlin

Wireless Security Researcher, Bastille
Marc Newlin (@marcnewlin) is a wireless security researcher at Bastille, where he discovered the MouseJack and KeySniffer vulnerabilities affecting wireless mice and keyboards.  A glutton for challenging side projects, Marc competed solo in two DARPA challenges, placing third in... Read More →


Thursday October 26, 2017 9:45am - 10:30am
Windsor Ballroom CDE