nullcon Delhi 2012: Day 2's action

4/14

How to develop an insecure product

Zoltán Hornák of Search Labs, Hungary explained about vulnerabilities spilling over from software onto unlikely and unexpected areas such as video set-top boxes, medical diagnostic equipment and even cars in this session. The talk discussed attacks against embedded systems and the need for a security lifecycle while engineering these products. The session featured a demonstration with a case study on set-top boxes.

Executive brief for this session (PDF)

<<In case you missed Day 1’s action, catch it here.

 

View All Photo Stories

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close