The Internet of Evil Things
- Johannes Ullrich, Ph.D
- Monday, August 17th, 7:15pm - 9:15pm
Embedded systems are the new target. As our networks grow uncontrolled and unsupervised, forgotten machines will take over and rule us all soon. Analyzing the embedded malware that comes with this presents a number of challenges. Current debuggers and virtualization techniques that mimic these systems are incomplete and will not allow us to completely analyze malware the way we are used to in good old desktop malware environments. These malware blackboxes need different instrumentations and techniques. We will present some ideas on how to analyze these malware samples, and introduce you to embedded system analysis (unless your bot is removing this event from your smart watch's reminder list).
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
- Lunch & Learn: Short presentations given during the lunch break.
|Discover the Next Generation of Vulnerability Management Solutions
||Rich McCrohan, Regional Sales Manager and Andy Nickel, Systems Engineer - Core Security
||Tuesday, August 18th, 12:30pm - 1:15pm
||Lunch and Learn
|DLP FAIL!!! Using Encoding, Steganography, and Covert Channels to Evade DLP and Other Critical Controls
||Tuesday, August 18th, 7:15pm - 8:15pm
|ICS/SCADA Cyber Attacks - Fact vs. Fiction
||Robert M. Lee
||Tuesday, August 18th, 8:15pm - 9:15pm