The document discusses attacking industrial control systems by exploiting vulnerabilities in analog-to-digital converters (ADCs). It describes how generating signals at specific frequencies and amplitudes can cause ADCs to output incorrect digital values, potentially compromising sensor monitoring systems. Several proof-of-concept attacks are demonstrated, including generating signals that race the ADC clock, exceed the valid amplitude range, or produce different readings from multiple ADCs measuring the same signal. The document warns that many industrial systems have vulnerabilities in their analog interfacing that could allow remote manipulation if exploited.
https://telecombcn-dl.github.io/2018-dlai/
Deep learning technologies are at the core of the current revolution in artificial intelligence for multimedia data analysis. The convergence of large-scale annotated datasets and affordable GPU hardware has allowed the training of neural networks for data analysis tasks which were previously addressed with hand-crafted features. Architectures such as convolutional neural networks, recurrent neural networks or Q-nets for reinforcement learning have shaped a brand new scenario in signal processing. This course will cover the basic principles of deep learning from both an algorithmic and computational perspectives.
https://telecombcn-dl.github.io/2018-dlai/
Deep learning technologies are at the core of the current revolution in artificial intelligence for multimedia data analysis. The convergence of large-scale annotated datasets and affordable GPU hardware has allowed the training of neural networks for data analysis tasks which were previously addressed with hand-crafted features. Architectures such as convolutional neural networks, recurrent neural networks or Q-nets for reinforcement learning have shaped a brand new scenario in signal processing. This course will cover the basic principles of deep learning from both an algorithmic and computational perspectives.
This presentation describes my experience with nRF24L01, Arduino, Bus Pirate and various other hardware toys when somebody who does software gets into contact with "real stuff".
I presented this in my graduation college in-front of my classmates wherein i described various types os hacking techniques used by the "Bad Guys" and also how to mitigate them.
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon YangLyon Yang
This is a light training/presentation talk.
My name is Lyon Yang and I am an IoT hacker. I live in sunny Singapore where IoT is rapidly being deployed – in production. This walkthrough will aim to shed light on the subject of IoT, from finding vulnerabilities in IoT devices to getting shiny hash prompts.
Our journey starts with a holistic view of IoT security, the issues faced by IoT devices and the common mistakes made by IoT developers. Things will then get technical as we progress into a both ARM and MIPS exploitation, followed by a ‘hack-along-with-us’ workshop where you will be exploiting a commonly found IoT daemon. If you are new to IoT or a seasoned professional you will likely learn something new in this workshop.
https://www.iotvillage.org/#schedule
Reverse Engineering the TomTom Runner pt. 2Luis Grangeia
Second presentation of my research into reverse engineering a TomTom Runner GPS watch. In this I explain how I got running code inside an unfamiliar device and proceeded to bypass its security measures and extract firmware keys and code from the device.
More details on my personal blog, at http://grangeia.io
Presented in October 2015 at "Confraria de Segurança da Informação" in Lisbon
Reverse Engineering the TomTom Runner pt. 1 Luis Grangeia
A hacker likes computers for the same reason that a child likes legos: both allow the creation of something new. However the growing trend has been to 'close up' general purpose computing into devices that serve a narrow purpose. It's been happening with games consoles, routers, smartphones, smart TV's and more recently, smartwatches. A hacker will face this trend as an additional challenge and will be even more motivated to gain control over the device.
This talk is a journey to the world of 'reverse engineering' of a device of the "Internet of Things", in this case a Tomtom Runner sports watch. The author has little previous experience in reverse engineering of embedded systems, so the talk aims to serve as an introduction to this topic, what motivations and what kind of approaches may be tried.
Presented in September 2015 at "Confraria de Segurança da Informação" in Lisbon
2014년은 사물인터넷으로 시작해서 사물인터넷으로 끝날만큼 사물인터넷에 대한 다양한 논의가 진행되었던 한해였던것 같습니다. 그러나, 겉으로 드러난 모습은 사물인터넷으로 포장된 다양한 커넥티드 디바이스들과 몇몇 사물인터넷 플랫폼이 출시되는 수준이었습니다. 제대로 된 사물인터넷 서비스는 눈을 씻고 찾으려 해도 찾아볼 수 없는 것이 현실이었죠. 그래서, 사물인터넷 컨셉을 바탕으로 하는 서비스 어프로치에 대해서 3개의 카테고리 8개 어프로치로 구분하여 정리했습니다. 아직까지 생각을 정리하는 중이기는 하지만, 사물인터넷 비즈니스를 준비하시는 분들에게 도움이 되었으면 하는 마음에 자료를 공유합니다. 본 자료는 2014년 12월 11일 저녁 7시부터 9시 사이에 IoT혁신센터에서 발표한 자료임을 말씀드립니다.
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC DefconRussia
Мы поговорим об общей проблеме валидации входных данных и качестве их обработки. Интерпретация входящих данных оказывает прямое влияние на решения, принимаемые в физической инфраструктуре: если какая-либо часть данных обрабатывается недостаточно аккуратно, это может повлиять на эффективность и безопасность процесса.
В этой беседе мы обсудим атаки на процесс обработки данных и природу концепции «never trust your inputs» в контексте информационно-физических систем (в общем смысле, то есть любых подобных систем). Для иллюстрации проблемы мы используем уязвимости аналого-цифровых преобразователей (АЦП), которые можно заставить выдавать поддельный цифровой сигнал с помощью изменения частоты и фазы входящего аналогового сигнала: ошибка масштабирования такого сигнала может вызывать целочисленное переполнение и дает возможность эксплуатировать уязвимости в логике PLC/встроенного ПО. Также мы покажем реальные примеры использования подобных уязвимостей и последствия этих нападений.
This presentation describes my experience with nRF24L01, Arduino, Bus Pirate and various other hardware toys when somebody who does software gets into contact with "real stuff".
I presented this in my graduation college in-front of my classmates wherein i described various types os hacking techniques used by the "Bad Guys" and also how to mitigate them.
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon YangLyon Yang
This is a light training/presentation talk.
My name is Lyon Yang and I am an IoT hacker. I live in sunny Singapore where IoT is rapidly being deployed – in production. This walkthrough will aim to shed light on the subject of IoT, from finding vulnerabilities in IoT devices to getting shiny hash prompts.
Our journey starts with a holistic view of IoT security, the issues faced by IoT devices and the common mistakes made by IoT developers. Things will then get technical as we progress into a both ARM and MIPS exploitation, followed by a ‘hack-along-with-us’ workshop where you will be exploiting a commonly found IoT daemon. If you are new to IoT or a seasoned professional you will likely learn something new in this workshop.
https://www.iotvillage.org/#schedule
Reverse Engineering the TomTom Runner pt. 2Luis Grangeia
Second presentation of my research into reverse engineering a TomTom Runner GPS watch. In this I explain how I got running code inside an unfamiliar device and proceeded to bypass its security measures and extract firmware keys and code from the device.
More details on my personal blog, at http://grangeia.io
Presented in October 2015 at "Confraria de Segurança da Informação" in Lisbon
Reverse Engineering the TomTom Runner pt. 1 Luis Grangeia
A hacker likes computers for the same reason that a child likes legos: both allow the creation of something new. However the growing trend has been to 'close up' general purpose computing into devices that serve a narrow purpose. It's been happening with games consoles, routers, smartphones, smart TV's and more recently, smartwatches. A hacker will face this trend as an additional challenge and will be even more motivated to gain control over the device.
This talk is a journey to the world of 'reverse engineering' of a device of the "Internet of Things", in this case a Tomtom Runner sports watch. The author has little previous experience in reverse engineering of embedded systems, so the talk aims to serve as an introduction to this topic, what motivations and what kind of approaches may be tried.
Presented in September 2015 at "Confraria de Segurança da Informação" in Lisbon
2014년은 사물인터넷으로 시작해서 사물인터넷으로 끝날만큼 사물인터넷에 대한 다양한 논의가 진행되었던 한해였던것 같습니다. 그러나, 겉으로 드러난 모습은 사물인터넷으로 포장된 다양한 커넥티드 디바이스들과 몇몇 사물인터넷 플랫폼이 출시되는 수준이었습니다. 제대로 된 사물인터넷 서비스는 눈을 씻고 찾으려 해도 찾아볼 수 없는 것이 현실이었죠. 그래서, 사물인터넷 컨셉을 바탕으로 하는 서비스 어프로치에 대해서 3개의 카테고리 8개 어프로치로 구분하여 정리했습니다. 아직까지 생각을 정리하는 중이기는 하지만, 사물인터넷 비즈니스를 준비하시는 분들에게 도움이 되었으면 하는 마음에 자료를 공유합니다. 본 자료는 2014년 12월 11일 저녁 7시부터 9시 사이에 IoT혁신센터에서 발표한 자료임을 말씀드립니다.
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC DefconRussia
Мы поговорим об общей проблеме валидации входных данных и качестве их обработки. Интерпретация входящих данных оказывает прямое влияние на решения, принимаемые в физической инфраструктуре: если какая-либо часть данных обрабатывается недостаточно аккуратно, это может повлиять на эффективность и безопасность процесса.
В этой беседе мы обсудим атаки на процесс обработки данных и природу концепции «never trust your inputs» в контексте информационно-физических систем (в общем смысле, то есть любых подобных систем). Для иллюстрации проблемы мы используем уязвимости аналого-цифровых преобразователей (АЦП), которые можно заставить выдавать поддельный цифровой сигнал с помощью изменения частоты и фазы входящего аналогового сигнала: ошибка масштабирования такого сигнала может вызывать целочисленное переполнение и дает возможность эксплуатировать уязвимости в логике PLC/встроенного ПО. Также мы покажем реальные примеры использования подобных уязвимостей и последствия этих нападений.
RTaW SysML Companion transforms SysML models into VHDL/AMS so that it becomes possible to simulate SysML models. SysML Companion enables to perform virtual prototyping and derive tests very early in the design phase directly from SysML specification. To the best of our knowledge, SysML Companion is the first tool of its kind.
Challenges in Protection Relay Testing for Tomorrow’s Power Grid
Very many challenges related to protection relay testing are met today in the field and in the research industry.
There are often new and more complex applications such as wind turbines, very fast switching power electronics, photovoltaic cells and the battery and electric vehicle technologies. This implies among other things new converter topologies and smart grid considerations. These systems cannot be protected the same way as what was already being done, so this increases the complexity of the algorithms used.
Real-time simulation is a novel approach to design and test protection relay algorithms.
Low Power VLSI design architecture for EDA (Electronic Design Automation) and Modern Power Estimation, Reduction and Fixing technologies including clock gating and power gating
Google Calendar is a versatile tool that allows users to manage their schedules and events effectively. With Google Calendar, you can create and organize calendars, set reminders for important events, and share your calendars with others. It also provides features like creating events, inviting attendees, and accessing your calendar from mobile devices. Additionally, Google Calendar allows you to embed calendars in websites or platforms like SlideShare, making it easier for others to view and interact with your schedules.
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...Peter Gallagher
In this session delivered at Leeds IoT, I talk about how you can control a 3D printed Robot Arm with a Raspberry Pi, .NET 8, Blazor and SignalR.
I also show how you can use a Unity app on an Meta Quest 3 to control the arm VR too.
You can find the GitHub repo and workshop instructions here;
https://bit.ly/dotnetrobotgithub
30. for(;;){
asm("cbi 0x0e, 6");
val = __fastAnalogRead(A0); //inline function
asm("sbi 0x0e, 6");
sum += val;
step++;
if(step > 120){
if(phase >= 170){
phase = 0;
freq += 100;
}else
phase += 10;
si5351.set_freq(freq, 0ULL, SI5351_CLK0);
si5351.set_phase(SI5351_CLK0, phase);
Serial.print(sum * 1.0/step); 30
LETS REPEAT OUR EXPERIMENT
Let’s introduce “counter” to our code for averaging 120 ADC conversions:
Fast analog read
Average, frequency changing
and out to serial port
goes here
We’re putting here an outgoing
Zero-peak signal to see when
ADC do actual work