Embedded Device Hacking

  • Formal
  • The exploiting of vulnerabilities in embedded software to gain control of the device. Embedded systems exist in a wide variety of devices including Internet and wireless access points, IP cameras, security systems, drones, and industrial control systems.
  • Practical
  • Attackers have hacked embedded systems to spy on the devices, to take control of them or simply to disable (brick) them. Embedded systems exist in a wide variety of devices including Internet and wireless access points, IP cameras, security systems, pace makers, drones and industrial control systems.

联系我们

欢迎与我们交流!

* Required
* Required
* Required
* Invalid email address
提交此表单,即表示您同意 Asia Growth Partners 可以与您联系并分享洞察和营销信息。
不,谢谢,我不想收到来自 Asia Growth Partners 的任何营销电子邮件。
提交

Thank you for your message!
We will contact you soon.