Vulnerabilities in Old Third-Party Software Components- Importance of Having SBoM for IoT/OT Devices

  Рет қаралды 1,880

Black Hat

Black Hat

Күн бұрын

Full Title: Old Code Dies Hard: Finding New Vulnerabilities in Old Third-Party Software Components and the Importance of Having SBoM for IoT/OT Devices
Device manufacturers often rely on "security by obscurity" for their own code - e.g., by encrypting firmware files - and on the "principle of many eyes" when choosing to integrate open source components - i.e., if there are no public CVEs, a component is considered safe.
This talk shows that these principles can fail the manufacturers, but serve the attackers well. Our running example is the software components of a wireless gateway device that is used to bring networking to industrial control systems, remote healthcare locations, and other environments. We discuss our journey of finding over 20 vulnerabilities within these components, both internal and open source...
By: Stanislav Dashevskyi , Francesco La Spina
Full Abstract and Presentation Materials:
www.blackhat.c...

Пікірлер
Мен атып көрмегенмін ! | Qalam | 5 серия
25:41
DEF CON 32 - The Darkest Side of Bug Bounty - Jason Haddix
32:30
DEFCONConference
Рет қаралды 51 М.
Project Zero: Ten Years of 'Make 0-Day Hard'
40:20
Black Hat
Рет қаралды 2,9 М.
Ansible 101 - Episode 2 - Ad-hoc tasks and Inventory
1:02:45
Jeff Geerling
Рет қаралды 134 М.
Privacy Detective: Sniffing Out Your Data Leaks for Android
30:04
Keynote - Securing Our Cyberspace Together
1:02:26
Black Hat
Рет қаралды 2,1 М.