SlideShare a Scribd company logo
Honey, IHoney, IHoney, IHoney, IHoney, IHoney, IHoney, IHoney, I’’’’’’’’m Home!!m Home!!m Home!!m Home!!m Home!!m Home!!m Home!!m Home!!
Hacking ZHacking Z--Wave Home Automation SystemsWave Home Automation Systems
Behrang Fouladi, SensePost UK
Sahand Ghanoun
HomeHome
AutomationAutomation
Central
Control
Entry
Control
Smart
Appliances
Home
Entertainment
System
Lighting
Home
Security
CCTV
Sensors
HVAC
Family Guy from Fox Broadcasting Company
Convenience
Accessibility
Security
Energy Management
Remote Monitoring & Control
Z-Wave devices to be shipped in 2013
5 million
How Does It Work?How Does It Work?
Wireless
AES-128 WPA/WPA2
E0
Power Line Dual Band
Proprietary
AES-128
Door Lock
Door/Window Sensor
Motion Sensor
Siren
Exploitation Framework
Joshua Wright. 2009.
Zigbee Wardriving Kit
Travis GoodSpeed. 2012.
Pen Testing Over Power Lines
Dave Kennedy, Rob Simon. 2011.
Why ZWhy Z--Wave?Wave?
According to Z-Wave Alliance…
80% of US home security market is Z-Wave
2012 NAHB survey shows…
Wireless home security tops homeowners’ wishlist
Proprietary protocol
No public research so far...
ZZ--WaveWave
ProtocolProtocol
Physical
Transport
Network
Application
Security
Error Detection & Retransmission
Acknowledgment
32-bit Home ID
8-bits Node ID
Mesh Network
Topology Discovery
Automatic Healing
Encryption, Anti-replay and MAC
Device specific commands & parameters 
Physical
868.42 (EU) / 908.42 (US) MHz
9.6/40/100 KbpsPhysical
ZZ--Wave Protocol StackWave Protocol Stack
RF ConfigurationsRF Configurations
FSK Modulation
9.6/40 kbps
868.42/40 MHz (EU)
±20 KHz
Manchester/NRZ
Texas Instruments CC1110Texas Instruments CC1110
SubSub--1 GHz RF 1 GHz RF transcievertransciever SoCSoC
Supports ZSupports Z--Wave configurationsWave configurations
Communication via serialCommunication via serial
SmartRFSmartRF Studio ToolStudio Tool
ITU-T Rec. G.9959
We identified inconsistencies with
the actual implementation!
ZZ--Wave Frame FormatWave Frame Format
PHY Frame
Singlecast
MAC Frame
Application
Frame
ZZ--ForceForce
Packet
needed to do network discovery
I Like toI Like to
Move It!!Move It!!
Live DemoLive Demo
ZZ--WaveWave
SecuritySecurity
Encryption:
AES-OFB
Message Freshness:
64-bit Nonce
Data Authentication:
AES-CBCMAC
128-bit Random Network Key: Kn
Custom
Key Establishment Protocol
128-bit Cipher & MAC 
Keys: Derived From Kn
Custom
Key Establishment Protocol
Get ready for key establishment
Ready
Nonce request
Nonce value 
Encrypted network key – Kn
Nonce request
Nonce value 
Encrypted message (new key is set)
Encrypt & 
MAC by K0
Encrypt & 
MAC by Kn
Get ready for key establishment
Ready
Nonce request
Nonce value 
Encrypted network key – Kn
Nonce request
Nonce value 
Encrypted message (new key is set)
Encrypt & 
MAC by K0
Encrypt & 
MAC by Kn
Protocol VulnerabilitiesProtocol Vulnerabilities
Passive attack:Passive attack:
Intercept and decrypt the Intercept and decrypt the ““set keyset key”” messagemessage
Happens at system installation time inHappens at system installation time in ““low power transmissionlow power transmission”” modemode
Passive attack:Passive attack:
Intercept and decrypt the Intercept and decrypt the ““set keyset key”” messagemessage
Happens at system installation time inHappens at system installation time in ““low power transmissionlow power transmission”” modemode
With With ““whomwhom”” key is being key is being 
established?established?
With someone who knowsWith someone who knows……
temporary key valuetemporary key value
andand……
……key derivation functionskey derivation functions
)(
)(
mKm
cKc
PasswdECBAESK
PasswdECBAESK
n
n
}0]{16[0 byteK
)||||||||
,(
),(
CLENDSTSRCSH
IVCBCMACAESMAC
PIVOFBAESC
m
c
K
K
Unauthorized Key ResetUnauthorized Key Reset
Attack?Attack?
Honey,Honey,
II’’m Home!!m Home!!
Live DemoLive Demo
Image from boratmakeglorioustributeactto.com
Hmm... Now What?Hmm... Now What?
Critical vulnerability… needs an urgent fix!
Short-term fix (OTA)
Check current key state before it’s set
Actual fix (Next Gen)
Public key cryptography and authentication
More technical detail in our More technical detail in our 
White PaperWhite Paper
Thank You!Thank You!
Behrang FouladiBehrang Fouladi
BehrangFouladi
Sahand GhanounSahand Ghanoun
Sahand__

More Related Content

What's hot

Is the Smart Home fit for purpose?
Is the Smart Home fit for purpose? Is the Smart Home fit for purpose?
Is the Smart Home fit for purpose?
Thom. Poole
 
Pros and cons of Smart Home Systems
Pros and cons of Smart Home SystemsPros and cons of Smart Home Systems
Pros and cons of Smart Home Systems
SadiaBU
 
Smart home in the insurance industry
Smart home in the insurance industrySmart home in the insurance industry
Smart home in the insurance industry
markusmanniic
 
Smart home solution
Smart home solutionSmart home solution
Smart home solution
tipo-lab
 
Home automation system
Home automation systemHome automation system
Home automation system
RaadSabah
 
Arduino Smart Home Automation Controller
Arduino Smart Home Automation ControllerArduino Smart Home Automation Controller
Arduino Smart Home Automation Controller
Oishik Sarkar
 
Application of ai in home automation
Application of ai in home automationApplication of ai in home automation
Application of ai in home automation
Bharadwaj Sharma
 
Smart Home Devices
Smart Home DevicesSmart Home Devices
Smart Home Devices
Planetech USA
 
Smarthome
SmarthomeSmarthome
Smarthome
NIT MEGHALAYA
 
Smart home solution
Smart home solutionSmart home solution
Smart home solution
zugo Tech Corp.
 
Smart home
Smart homeSmart home
Smart home
Muhannad Kalbouneh
 
Smart home applications
Smart home applicationsSmart home applications
Smart home applications
OmarTashkandi1
 
Smart house (Move to Easy Life)
Smart house (Move to Easy Life)Smart house (Move to Easy Life)
Smart house (Move to Easy Life)
chirag thakkar
 
Smart home applications in daily life
Smart home applications in daily lifeSmart home applications in daily life
Smart home applications in daily life
Sugata Mondal
 
Smart home
Smart homeSmart home
Smart homeNhat Loc
 
Home automation using raspberry pi
Home automation using raspberry piHome automation using raspberry pi
Home automation using raspberry pi
dnp99
 
Talk on Home Automation & IoT - PhaseShift 2016 - BMS - With QA & Event Pics
Talk on Home Automation & IoT - PhaseShift 2016 - BMS - With QA & Event PicsTalk on Home Automation & IoT - PhaseShift 2016 - BMS - With QA & Event Pics
Talk on Home Automation & IoT - PhaseShift 2016 - BMS - With QA & Event PicsRitesh Nagpal
 
Home automation in kerala | home automation in calicut | Smart home solutions...
Home automation in kerala | home automation in calicut | Smart home solutions...Home automation in kerala | home automation in calicut | Smart home solutions...
Home automation in kerala | home automation in calicut | Smart home solutions...
Arun Kumar
 

What's hot (20)

Is the Smart Home fit for purpose?
Is the Smart Home fit for purpose? Is the Smart Home fit for purpose?
Is the Smart Home fit for purpose?
 
Pros and cons of Smart Home Systems
Pros and cons of Smart Home SystemsPros and cons of Smart Home Systems
Pros and cons of Smart Home Systems
 
Smart home in the insurance industry
Smart home in the insurance industrySmart home in the insurance industry
Smart home in the insurance industry
 
Smart home solution
Smart home solutionSmart home solution
Smart home solution
 
Home automation system
Home automation systemHome automation system
Home automation system
 
Arduino Smart Home Automation Controller
Arduino Smart Home Automation ControllerArduino Smart Home Automation Controller
Arduino Smart Home Automation Controller
 
Smart home
Smart homeSmart home
Smart home
 
Application of ai in home automation
Application of ai in home automationApplication of ai in home automation
Application of ai in home automation
 
Smart Home Devices
Smart Home DevicesSmart Home Devices
Smart Home Devices
 
Smarthome
SmarthomeSmarthome
Smarthome
 
Smart home solution
Smart home solutionSmart home solution
Smart home solution
 
Smart home
Smart homeSmart home
Smart home
 
Smart home applications
Smart home applicationsSmart home applications
Smart home applications
 
Smart house (Move to Easy Life)
Smart house (Move to Easy Life)Smart house (Move to Easy Life)
Smart house (Move to Easy Life)
 
Smart home applications in daily life
Smart home applications in daily lifeSmart home applications in daily life
Smart home applications in daily life
 
Smart home
Smart homeSmart home
Smart home
 
Home automation using raspberry pi
Home automation using raspberry piHome automation using raspberry pi
Home automation using raspberry pi
 
Talk on Home Automation & IoT - PhaseShift 2016 - BMS - With QA & Event Pics
Talk on Home Automation & IoT - PhaseShift 2016 - BMS - With QA & Event PicsTalk on Home Automation & IoT - PhaseShift 2016 - BMS - With QA & Event Pics
Talk on Home Automation & IoT - PhaseShift 2016 - BMS - With QA & Event Pics
 
Home automation in kerala | home automation in calicut | Smart home solutions...
Home automation in kerala | home automation in calicut | Smart home solutions...Home automation in kerala | home automation in calicut | Smart home solutions...
Home automation in kerala | home automation in calicut | Smart home solutions...
 
Smart home presentation
Smart home presentationSmart home presentation
Smart home presentation
 

Viewers also liked

AWS Survival Guide
AWS Survival GuideAWS Survival Guide
AWS Survival Guide
Ken Johnson
 
ZWave Lock Programming
ZWave Lock ProgrammingZWave Lock Programming
ZWave Lock Programming
g4elan
 
Home Automation Products and Suppliers in UAE
Home Automation Products and Suppliers in UAEHome Automation Products and Suppliers in UAE
Home Automation Products and Suppliers in UAE
Beatriz john
 
Presentation Smart Home With Home Automation
Presentation Smart Home With Home AutomationPresentation Smart Home With Home Automation
Presentation Smart Home With Home Automation
Arifur Rahman
 
Home Automation with Asterisk - Astricon 2015 - Alberto Sagredo Castro
Home Automation with Asterisk - Astricon 2015 - Alberto Sagredo CastroHome Automation with Asterisk - Astricon 2015 - Alberto Sagredo Castro
Home Automation with Asterisk - Astricon 2015 - Alberto Sagredo Castro
Alberto Sagredo Castro
 
Presentation on home automation
Presentation on home automationPresentation on home automation
Presentation on home automation
Subhash Kumar Yadav
 
Home automation ppt-kamal lamichhane
Home automation ppt-kamal lamichhaneHome automation ppt-kamal lamichhane
Home automation ppt-kamal lamichhaneKamal Lamichhane
 
Poster for Development of solar drier for post harvest treatment
Poster for Development of solar drier for post harvest treatmentPoster for Development of solar drier for post harvest treatment
Poster for Development of solar drier for post harvest treatment
Sumit Dharmarao
 
Home automation for humans
Home automation for humansHome automation for humans
Home automation for humans
Gordon Meyer
 
A Brief History of Home Automation
A Brief History of Home AutomationA Brief History of Home Automation
A Brief History of Home Automation
Progressive Automations
 
Solar Dryer & Solar Distillation
Solar Dryer & Solar DistillationSolar Dryer & Solar Distillation
Solar Dryer & Solar Distillation
Smit Shah
 
Orange Home Automation Infrastructure – open interaction from the Cloud - Jea...
Orange Home Automation Infrastructure – open interaction from the Cloud - Jea...Orange Home Automation Infrastructure – open interaction from the Cloud - Jea...
Orange Home Automation Infrastructure – open interaction from the Cloud - Jea...
mfrancis
 
make home automation
make home automationmake home automation
make home automation
Naresh kumar Sagar
 
Various Drying methods for food application
Various Drying methods for food application Various Drying methods for food application
Various Drying methods for food application
Abirami Nadarajan
 
Visualization of big time series data
Visualization of big time series dataVisualization of big time series data
Visualization of big time series data
Rob Hyndman
 
Solar dryer
Solar dryerSolar dryer
Solar dryer
Anugrah Soy
 
Home Automation over Internet
Home Automation over InternetHome Automation over Internet
Home Automation over Internet
Rakesh Chintha
 
Tutorial 6 queues & arrays & results recording
Tutorial 6   queues & arrays & results recording Tutorial 6   queues & arrays & results recording
Tutorial 6 queues & arrays & results recording
Mohd Batati
 
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsComparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
Real-Time Innovations (RTI)
 

Viewers also liked (20)

AWS Survival Guide
AWS Survival GuideAWS Survival Guide
AWS Survival Guide
 
ZWave Lock Programming
ZWave Lock ProgrammingZWave Lock Programming
ZWave Lock Programming
 
Home Automation Products and Suppliers in UAE
Home Automation Products and Suppliers in UAEHome Automation Products and Suppliers in UAE
Home Automation Products and Suppliers in UAE
 
Presentation Smart Home With Home Automation
Presentation Smart Home With Home AutomationPresentation Smart Home With Home Automation
Presentation Smart Home With Home Automation
 
Home Automation with Asterisk - Astricon 2015 - Alberto Sagredo Castro
Home Automation with Asterisk - Astricon 2015 - Alberto Sagredo CastroHome Automation with Asterisk - Astricon 2015 - Alberto Sagredo Castro
Home Automation with Asterisk - Astricon 2015 - Alberto Sagredo Castro
 
Presentation on home automation
Presentation on home automationPresentation on home automation
Presentation on home automation
 
Home automation ppt-kamal lamichhane
Home automation ppt-kamal lamichhaneHome automation ppt-kamal lamichhane
Home automation ppt-kamal lamichhane
 
Poster for Development of solar drier for post harvest treatment
Poster for Development of solar drier for post harvest treatmentPoster for Development of solar drier for post harvest treatment
Poster for Development of solar drier for post harvest treatment
 
Home automation for humans
Home automation for humansHome automation for humans
Home automation for humans
 
A Brief History of Home Automation
A Brief History of Home AutomationA Brief History of Home Automation
A Brief History of Home Automation
 
Solar Dryer & Solar Distillation
Solar Dryer & Solar DistillationSolar Dryer & Solar Distillation
Solar Dryer & Solar Distillation
 
Orange Home Automation Infrastructure – open interaction from the Cloud - Jea...
Orange Home Automation Infrastructure – open interaction from the Cloud - Jea...Orange Home Automation Infrastructure – open interaction from the Cloud - Jea...
Orange Home Automation Infrastructure – open interaction from the Cloud - Jea...
 
final ppt
final pptfinal ppt
final ppt
 
make home automation
make home automationmake home automation
make home automation
 
Various Drying methods for food application
Various Drying methods for food application Various Drying methods for food application
Various Drying methods for food application
 
Visualization of big time series data
Visualization of big time series dataVisualization of big time series data
Visualization of big time series data
 
Solar dryer
Solar dryerSolar dryer
Solar dryer
 
Home Automation over Internet
Home Automation over InternetHome Automation over Internet
Home Automation over Internet
 
Tutorial 6 queues & arrays & results recording
Tutorial 6   queues & arrays & results recording Tutorial 6   queues & arrays & results recording
Tutorial 6 queues & arrays & results recording
 
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsComparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
 

More from SensePost

objection - runtime mobile exploration
objection - runtime mobile explorationobjection - runtime mobile exploration
objection - runtime mobile exploration
SensePost
 
Vulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based ApplicationVulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based Application
SensePost
 
Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17
SensePost
 
Introducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration ToolkitIntroducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration Toolkit
SensePost
 
ZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana AttacksZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana Attacks
SensePost
 
Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22
SensePost
 
Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed Overview
SensePost
 
Botconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionBotconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server Detection
SensePost
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tat
SensePost
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented Defence
SensePost
 
Threats to machine clouds
Threats to machine cloudsThreats to machine clouds
Threats to machine clouds
SensePost
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
SensePost
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) Pwnage
SensePost
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get Hacked
SensePost
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application Hacking
SensePost
 
Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorism
SensePost
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
SensePost
 
Attacks and Defences
Attacks and DefencesAttacks and Defences
Attacks and Defences
SensePost
 
Corporate Threat Modeling v2
Corporate Threat Modeling v2Corporate Threat Modeling v2
Corporate Threat Modeling v2
SensePost
 
State of the information security nation
State of the information security nationState of the information security nation
State of the information security nation
SensePost
 

More from SensePost (20)

objection - runtime mobile exploration
objection - runtime mobile explorationobjection - runtime mobile exploration
objection - runtime mobile exploration
 
Vulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based ApplicationVulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based Application
 
Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17
 
Introducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration ToolkitIntroducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration Toolkit
 
ZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana AttacksZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana Attacks
 
Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22
 
Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed Overview
 
Botconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionBotconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server Detection
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tat
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented Defence
 
Threats to machine clouds
Threats to machine cloudsThreats to machine clouds
Threats to machine clouds
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) Pwnage
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get Hacked
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application Hacking
 
Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorism
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 
Attacks and Defences
Attacks and DefencesAttacks and Defences
Attacks and Defences
 
Corporate Threat Modeling v2
Corporate Threat Modeling v2Corporate Threat Modeling v2
Corporate Threat Modeling v2
 
State of the information security nation
State of the information security nationState of the information security nation
State of the information security nation
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Hacking Z-Wave Home Automation Systems