IoT Pressure Cooker What Could Go Wrong

BSidesCharm 2017

Presented by: Ben Actis
Date: Saturday April 29, 2017
Time: 14:30 - 15:00
Location: Track 1

This talk will dive into vulnerabilities discovered in an IoT pressure cooker. Demonstration of how an attacker can modify data in transmit and in storage on a mobile app with can modify the temp, timing and pressure of the device, which is a potential safety concern.

Ben Actis

Ben Actis spent five years at MITRE in the areas of mobile reverse engineering and network analytics. He taught intro to x86 and intro to flow analysis which are available on opensecuritytraining.info. He spent one year at Lookout's research and response team in San Francisco. He was the primary researcherresponsible for shedun/humming bad and xcode ghost. He is currently at Synack where he is a research and development engineer. When not reversing he is busy catching pokemon, taking Krav Maga, and trolling on twitter.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats