It WISN’t me, Attacking Industrial Wireless Mesh Networks by Erwin Paternotte (@stokedsecurity) & Mattijs van Ommeren (@alcyonsecurity) from Nixu Benelux (@NixuBenelux @NixuTigerTeam)

This presentation will fill this gap by providing the necessary building blocks to perform a more in-depth security analysis of WISN and provide tools to perform practical attacks against these wireless networks in order to verify resistance to real-world attacks.

Read More

The Race to Secure Texas Instruments Graphing Calculators by Brandon Wilson (@brandonlwilson)

In this talk, speaker will provide a technical overview of the history of achieving and maintaining unsigned code execution on the various graphing calculator models Texas Instruments has released over many years, as well as a personal recollection on how the first Flash unlock exploits were created and evolved to keep up with TI’s fixes, how the 512-bit RSA OS signing keys were factored and the legal fallout, and the current challenge to find and utilize new vulnerabilities for the latest models.

Read More

Strategies to Harden and Neutralize UAV Using RF DEW by José Lopes Esteves (@lopessecurity) Co-authored by Emmanuel Cottais (@EmmanuelCottais) & Chaouki Kasmi (@EMHacktivity)

This talk focuses on the technical trials and tribulations faced by the authors during the setup and the realization of IEMI susceptibility tests against common off the shelf UAVs. In order to get a fine grain understanding of the effects of IEMI at both physical and logical levels of the drone, a software instrumentation has been performed, implying a privileged access to the system. Some interesting results will also be provided about the effects observed on the target and discussed regarding their criticality.

Read More