Understanding security threats to embedded systems and IoT devices
描述
2019年 12月 27日
This video summarizes why hackers might attack an embedded device followed by a short overview of remote and physical attack methods. It then discusses four actual attacks on embedded systems, such as point of sales terminals and smart meters, detailing the weaknesses that the attack exploited to gain control or access to the system.