Big Sleep's breakthrough in discovering an SQLite vulnerability demonstrates how AI can reduce the opportunity window for attackers, marking a new era in vulnerability research.
How to Tame a Light Switch
Who would expect a light switch to offer up an extra entry point into your home network? This paper documents the analysis and testing of an IoT device with the intent to explain the possible ...
Attackers vs. Security Labs
Colin O'Flynn from NewAE and Jasper van Woudenberg CTO of Riscure discuss several prominent hardware attacks, comparing the attacker and security lab views.
Efficient Reverse Engineering of Automotive Firmware
In this paper we evaluate the efficiency of reverse engineering the firmware of an automotive embedded controller unit.