Embedded devices

Sort by:
Complete list of publications and software related to Embedded devices
embedded devices
Embedded Management Interfaces Emerging Massive Insecurity
Over the last few years, the number of devices that embed user-friendly management interfaces accessible from the network has drastically increased. These interfaces can be found on almost every kind of device, from lights-out management systems for PCs, to small SOHO NAS appliances, or photo frames. In this talk, we will cover the attack surface of embedded management interfaces and pinpoint which parts of them are the most likely to
@BlackHat USA 09, July 2009
medias:2
embedded devices
XCS cross channel scripting and its impact on web applications
We reveal a series of attacks against embedded devices based on a new type of vulnerability that we call cross channel scripting (XCS). XCS is a sophisticated form of cross site scripting (XSS) in which the attack injection and execution are carried out via different protocols.
@CCS, November 2009
medias:2
embedded devices
Towards Secure Embedded Web Interfaces
We audited the security of more than 30 embedded devices web interfaces and found more than 50 vulnerabilities. To help developers, we have developed WebDroid the first framework specifically dedicated to build secure embedded WebApp.
@Usenix Security, August 2011
medias:2
embedded devices
The emergence of cross channel scripting
We reveal a series of attacks against embedded devices based on a new type of vulnerability that we call cross channel scripting (XCS). XCS is a sophisticated form of cross site scripting (XSS) in which the attack injection and execution are carried out via different protocols.
@CACM Journal Volume 53 Number 8, July 2010
About me
Lead Google's anti-abuse research. Develop new ways to protect users and disrupt bad guys. Make Chrome safer and faster. Help keeping G+ and Gmail clean. Wear berets. Do magic tricks.
Performance
side bar: 0.0446999073029
getting publication: 0.266819953918
total: 0.314960002899