SlideShare a Scribd company logo
1 of 62
Download to read offline
Hacking medical devices
Don’t go breaking my heart:
Information Security
Research Lab UAH
$ whoami
2
Carlos Cilleruelo Rodríguez
Cybersecurity researcher carlos.cilleruelo@byronlabs.io
@carloslannister
/in/carlos-cilleruelo
Javier Junquera Sánchez
Cybersecurity researcher & lecturer
javier.junquera@uah.es
@junquera
/in/junquera
Introduction
➔ Critical Infrastructure Cybersecurity
○ Different to traditional company security
■ Specific industrial protocols (e.g,
Modbus, FHIR, HL7)
○ Sensitive nature of these infrastructures
and their peculiarities
○ Repercussions in the event of failure
3
Some significant attacks against Health Services
4
1
Wannacry
NHS - United Kingdom
May 2017
2
3
* Lawsuit to prove that a ransomware attack on a hospital was to blame for someone losing their life
Ransomware
Brno - Czech Republic
March 2020
June and July 2018
Data breach - APT
SingHealth - Singapore
Ransomware
Springhill - USA*
July 2019
6
September 2020
Ransomware
Helios - Germany*
Conti
HSE - Ireland
May 2021
7
COVID-19
5
4
Ryuk
Torrejón - Spain
February 2020
8
Clínic - Spain
March 2023
Repercussions
➔ Baby’s Death Alleged to Be Linked to Ransomware
➔ 78-year-old woman suffering from an aortic aneurysm
5
https://www.wired.co.uk/article/ransomware-hospital-death-germany
https://threatpost.com/babys-death-linked-ransomware/175232/
Medical devices
➔ Health Care centers have traditional IT infraestructures
➔ But also medical devices
○ Medical devices are also computers
■ Most of them are Windows based
○ New devices are constantly appearing
■ IoT medical devices
6
Philips TC30
IntelliVue MX40
KardiaMobile
Medical devices
➔ From 2011 cybersecurity problems has been found in medical
devices
○ Barnaby Michael Douglas Jack
■ October 2011 - Wireless hacking of insulin pumps
■ 2012 discovered vulnerabilities in pacemakers
■ Died a week before present at the Black Hat 2013 a
talk about hacking heart implants
7
Medtronic MiniMed 530G
Wireless communication
8
Naya Med Product Brochure - 2012
Medical Devices Advisory
➔ Known vulnerabilities - ICS MEDICAL ADVISORY
○ Insulin pumps
■ Medtronic NGP 600 Series Insulin Pumps
■ Alert Code: ICSMA-22-263-01
○ Pacemakers
■ Medtronic Conexus Radio Frequency Telemetry Protocol
■ Alert Code: ICSMA-19-080-01
○ Software
■ PACS (Picture archiving and communication system)
● Philips Vue PACS
● Alert Code: ICSMA-21-187-01
9
Wireless communication
➔ What happen if you play with a pacemaker?
○ Homeland series season 2 episode 10.
■ December 2, 2012
○ Vice President assination through hacking a pacemaker
10
Wireless communication
➔ Reality?
11
https://web.archive.org/web/20130731101632/http://blog.io
active.com/2013/02/broken-hearts-how-plausible-was.html
Marin, E., Singelée, D., Garcia, F. D., Chothia, T., Willems, R., &
Preneel, B. (2016, December). On the (in) security of the latest
generation implantable cardiac defibrillators and how to secure
them. In Proceedings of the 32nd annual conference on
computer security applications (pp. 226-236).
Wireless communication
12
➔ Device implanted in 2007
➔ He had his doctors
disable its wireless
capabilities to prevent
against a possible
assassination attempt
https://abcnews.go.com/US/vice-president-dick-cheney-feared-pacemaker-ha
cking/story?id=20621434
What about mobile apps? and IoT?
➔ Monitor and control through your mobile phone
13
Omnipod
DASH Insulin
Management
AZURE XT DR
MRI
SURESCAN
What about mobile apps? and IoT?
14
https://pacemate.com/wp-content/uploads/2021/12/MyCareLinkHeart-for-pacer-ICD-overview.pdf
Ok but … tell me how
How can I hack a medical device?
15
Step 1: Obtain a medical device
16
➔ Option 1: Contact a vendor and buy a device
Step 1: Obtain a medical device
17
➔ Option 2: Ebay
Step 1: Obtain a medical device
18
➔ Option 3: Amazon
Step 2: Gadgets and training
19
Device to analyze
➔ AliveCor, Kardia Mobile
➔ Pocked-sized ECG - IoT
➔ Less accurate than a normal ECG
➔ Use for patient follow–up
➔ Wireless communications
➔ Mobile App
◆ iOS
◆ Android
20
Mobile app
21
➔ You can consent or …
I consent to the collection, processing and
disclosure of my de-identified heart activity
data and related health information by
AliveCor as described in the Privacy Policy
Mobile app
22
➔ You can consent or … consent
Choose your experience
23
Demo time!
24
Methodology
➔ First Risk Analysis
➔ STRIDE model
◆ Spoofing
◆ Tampering
◆ Repudiation
◆ Information disclosure
◆ Denial of Service
◆ Elevation of Privilege
➔ Microsoft Threat Modeling Tool
25
Risk Analysis of Kardia Mobile
26
Reversing
➔ Laboratory setup
◆ What communication does it use?
27
Reversing process
28
White noise
29
Lab setup
➔ 18€ microphone
➔ Audio Analysis Software
◆ Audacity
◆ Sonic Visualiser
30
Data-over-sound
31
➔ Anything over 10 kHz is pretty much inaudible
Data-over-sound
➔ Fuzzing
32
Data-over-sound
➔ The frequency oscillates over time around 19.200 KHz
33
Data-over-sound
34
Data-over-sound
35
Demo time!
36
Main risks
37
➔ Lack of encryption and authentication in the communication process
◆ Spoofing / Tampering
■ Very High
◆ Info. disc.
■ Low
◆ Denial of Service
■ High
◆ Repudiation
■ Lawyer things
Report
➔ Responsible disclosure
○ No security.txt [RFC8615]
➔ Email to support - 05/07/2021 and 09/07/2021
38
Report
➔ Contact some CERTS and CISA
○ between 7/2021 and 11/2021
39
Report
40
Report
41
➔ 22-02-2022
○ Case created in VINCE
○ Initial contact with the Vendor
Report
42
➔ 25-03-2022
○ Wild Kardia Appeared
Report
43
➔ 13-04-2022
○ Working internally to understand the complaint
Report
44
➔ 27-06-2022
○ full disclosure?
Report
45
➔ 28-06-2022
○ Wild Kardia appeared again!
Report
46
➔ 06-07-2022
○ Internal assessments
Report
47
➔ 01-08-2022
○ Internal assessments of Kardia released
Patch - What patch?
48
➔ 01-08-2022
○ Solutions?
Patch - What patch?
49
➔ 01-08-2022
○ Solutions?
Patch - What patch?
➔ How to patch a hardware or design
failure?
○ Return the devices?
○ Try to put software mitigations
■ If possible
○ AuthN is inexpensive!
➔ Hardware failures are a problem (e.g.,
checkm8)
50
Report
51
➔ 16-08-2022
○ Low impact vulnerabilities are still a vulnerability
Report
52
➔ 05-10-2022
○ FDA (Food and Drug Administration) clearance for publishing
➔ 26-10-2022 - Public disclosure!
○
ICSMA-22-298-01
53
ICSMA-22-298-01
54
➔ Initial pairing in BL and BLE
Report
55
1 First contact to Alivecor
Report to CISA
July 2021
2
3
Full disclosure threat
And Alivecor wrapping up
Case created in VINCE
Alivecor appear
March 2022
August 2022
Internal assessment and
“solutions”
4
February 2022
4 June 2022
6
7
FDA clearance
Public disclosure
October 2022
Conclusions
56
➔ Safety v. Security
○ Hugo Teso - Profundizando en la seguridad de la aviación [Rooted
CON 2014] [Rooted CON 2015]
➔ Safety - Therac-25 incident
○ Therac-25 was a computer-controlled radiation therapy machine
○ It was involved in at least six accidents between 1985 and 1987,
in which patients were given massive overdoses of radiation
○ Software Engineering - NATO Software Engineering Conferences
Lack of regulation
57
➔ FDA 510(k) Clearance Process does not involve
cybersecurity measures
◆ “substantially equivalent” to another already
https://www.drugwatch.com/fda/510k-clearance/
Lack of regulation
58
➔ Lack of regulation
○ Regulation (EU) 2017/745 of the European Parliament
and of the Council of 5 April 2017 on medical devices
■ Applicable from May 2021
○ MDCG 2019-16 Guidance on Cybersecurity for medical
devices
Medical devices
➔ Medical devices are a black box problem
○ Patching? Updates?
○ AV? EDR?
➔ Medical devices and software must be submitted to a
S-SDLC process
○ Secure by design
○ Pentesting
○ Cybersecurity certifications for healthcare, LINCE?
59
Status of Healthcare Security
➔ Precarious and obsolete infrastructures
○ Highly dependant in Internet Explorer
○ Huge technology debt
➔ Lack of personal and budget
○ IT personal? IT security personnel?
➔ SPAIN
○ ESTRATEGIA DE SALUD PÚBLICA 2022
○ Cybersecurity?
60
Acknowledgments
61
That’s all folks!
carlos.cilleruelo@byronlabs.io
@carloslannister
/in/carlos-cilleruelo/
javier.junquera@uah.es
@junquera
/in/junquera
62

More Related Content

Similar to Don’t go breaking my heart: hacking medical devices (RootedCON 2023)

IoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoIoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoGlen Koskela
 
Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos, Inc.
 
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...Certrec
 
Safeguard Your Medical Devices from Cyber Threats
Safeguard Your Medical Devices from Cyber ThreatsSafeguard Your Medical Devices from Cyber Threats
Safeguard Your Medical Devices from Cyber ThreatsICS
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar PresentationCertrec
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Ulf Mattsson
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015Flaskdata.io
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015Flaskdata.io
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...Ulf Mattsson
 
Acus intel medical_devices
Acus intel medical_devicesAcus intel medical_devices
Acus intel medical_devicesatlanticcouncil
 
The Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and RisksThe Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and Risksatlanticcouncil
 
Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...Yokogawa
 
FDA’s Updated Guidance on Cybersecurity
FDA’s Updated Guidance on CybersecurityFDA’s Updated Guidance on Cybersecurity
FDA’s Updated Guidance on CybersecurityEMMAIntl
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
 
What about compliance?
What about compliance?What about compliance?
What about compliance?Vlad Stirbu
 

Similar to Don’t go breaking my heart: hacking medical devices (RootedCON 2023) (20)

IoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoIoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
 
Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware
 
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...
 
Safeguard Your Medical Devices from Cyber Threats
Safeguard Your Medical Devices from Cyber ThreatsSafeguard Your Medical Devices from Cyber Threats
Safeguard Your Medical Devices from Cyber Threats
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...
 
Acus intel medical_devices
Acus intel medical_devicesAcus intel medical_devices
Acus intel medical_devices
 
The Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and RisksThe Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and Risks
 
Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...
 
FDA’s Updated Guidance on Cybersecurity
FDA’s Updated Guidance on CybersecurityFDA’s Updated Guidance on Cybersecurity
FDA’s Updated Guidance on Cybersecurity
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
 
What about compliance?
What about compliance?What about compliance?
What about compliance?
 
A6704d01
A6704d01A6704d01
A6704d01
 
INT 1010 06-6.pdf
INT 1010 06-6.pdfINT 1010 06-6.pdf
INT 1010 06-6.pdf
 

More from Javier Junquera

Al-Kindi convirtió tu dataset en mi keylogger (RootedCON Criptored 2023)
Al-Kindi convirtió tu dataset en mi keylogger (RootedCON Criptored 2023)Al-Kindi convirtió tu dataset en mi keylogger (RootedCON Criptored 2023)
Al-Kindi convirtió tu dataset en mi keylogger (RootedCON Criptored 2023)Javier Junquera
 
De PARCHE a Vysion: construyendo un ecosistema CTI sobre la Darknet (RootedC...
De PARCHE  a Vysion: construyendo un ecosistema CTI sobre la Darknet (RootedC...De PARCHE  a Vysion: construyendo un ecosistema CTI sobre la Darknet (RootedC...
De PARCHE a Vysion: construyendo un ecosistema CTI sobre la Darknet (RootedC...Javier Junquera
 
El caso Solorigate: la exposición de SolarWinds, de SUNBURST a Supernova
El caso Solorigate: la exposición de SolarWinds, de SUNBURST a SupernovaEl caso Solorigate: la exposición de SolarWinds, de SUNBURST a Supernova
El caso Solorigate: la exposición de SolarWinds, de SUNBURST a SupernovaJavier Junquera
 
The day I ruled the world (RootedCON 2020)
The day I ruled the world (RootedCON 2020)The day I ruled the world (RootedCON 2020)
The day I ruled the world (RootedCON 2020)Javier Junquera
 
Conferencia Internet Society: El FBI El reabre el debate sobre backdoors y ci...
Conferencia Internet Society: El FBI El reabre el debate sobre backdoors y ci...Conferencia Internet Society: El FBI El reabre el debate sobre backdoors y ci...
Conferencia Internet Society: El FBI El reabre el debate sobre backdoors y ci...Javier Junquera
 
Tecnologías avanzadas de descubrimiento y análisis de la Dark Net
Tecnologías avanzadas de descubrimiento y análisis de la Dark NetTecnologías avanzadas de descubrimiento y análisis de la Dark Net
Tecnologías avanzadas de descubrimiento y análisis de la Dark NetJavier Junquera
 

More from Javier Junquera (7)

Al-Kindi convirtió tu dataset en mi keylogger (RootedCON Criptored 2023)
Al-Kindi convirtió tu dataset en mi keylogger (RootedCON Criptored 2023)Al-Kindi convirtió tu dataset en mi keylogger (RootedCON Criptored 2023)
Al-Kindi convirtió tu dataset en mi keylogger (RootedCON Criptored 2023)
 
De PARCHE a Vysion: construyendo un ecosistema CTI sobre la Darknet (RootedC...
De PARCHE  a Vysion: construyendo un ecosistema CTI sobre la Darknet (RootedC...De PARCHE  a Vysion: construyendo un ecosistema CTI sobre la Darknet (RootedC...
De PARCHE a Vysion: construyendo un ecosistema CTI sobre la Darknet (RootedC...
 
El caso Solorigate: la exposición de SolarWinds, de SUNBURST a Supernova
El caso Solorigate: la exposición de SolarWinds, de SUNBURST a SupernovaEl caso Solorigate: la exposición de SolarWinds, de SUNBURST a Supernova
El caso Solorigate: la exposición de SolarWinds, de SUNBURST a Supernova
 
The day I ruled the world (RootedCON 2020)
The day I ruled the world (RootedCON 2020)The day I ruled the world (RootedCON 2020)
The day I ruled the world (RootedCON 2020)
 
Conferencia Internet Society: El FBI El reabre el debate sobre backdoors y ci...
Conferencia Internet Society: El FBI El reabre el debate sobre backdoors y ci...Conferencia Internet Society: El FBI El reabre el debate sobre backdoors y ci...
Conferencia Internet Society: El FBI El reabre el debate sobre backdoors y ci...
 
Password cracking
Password crackingPassword cracking
Password cracking
 
Tecnologías avanzadas de descubrimiento y análisis de la Dark Net
Tecnologías avanzadas de descubrimiento y análisis de la Dark NetTecnologías avanzadas de descubrimiento y análisis de la Dark Net
Tecnologías avanzadas de descubrimiento y análisis de la Dark Net
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Don’t go breaking my heart: hacking medical devices (RootedCON 2023)