If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!
Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.
This material is both important and innovative because it addresses the
more and more pressing matter of securing/hacking the IoT, hence the
embedded devices themselves. Moreover, it's envisioned that the topic will
go in the next few years from important to critically important.
This material is definitely innovative because it will provide technical
aspects of security research by combining several interesting
research directions:
- non-x86 emulation (and the caveats)
- some aspects of static and dynamic analysis
- machine learning
- device fingerprinting
This material is significant because it will present the results, knowledge
and insights that resulted from three years of experimentation and work
using systematic, methodological and academic approaches.
Audience will be presented with technical knowledge, demos, insights, lessons
learned and open challenges.