Reverse Engineering

Security Highlight: Is AI ready for finding security vulnerabilities?

Security Highlight: Is AI ready for finding security vulnerabilities?

Big Sleep's breakthrough in discovering an SQLite vulnerability demonstrates how AI can reduce the opportunity window for attackers, marking a new era in vulnerability research.
How to Tame a Light Switch

How to Tame a Light Switch

Who would expect a light switch to offer up an extra entry point into your home network? This paper documents the analysis and testing of an IoT device with the intent to explain the possible ...
Attackers vs. Security Labs

Attackers vs. Security Labs

Colin O'Flynn from NewAE and Jasper van Woudenberg CTO of Riscure discuss several prominent hardware attacks, comparing the attacker and security lab views.
Efficient Reverse Engineering of Automotive Firmware

Efficient Reverse Engineering of Automotive Firmware

In this paper we evaluate the efficiency of reverse engineering the firmware of an automotive embedded controller unit.