SlideShare une entreprise Scribd logo
1  sur  62
Télécharger pour lire hors ligne
NETSQUARE
< THE DECADE BEHIND..
AND THE
decade ahead >
saumil shah - ceo, net-square
NETSQUARE
NSCONCLAVE2020
#REPUBLICDAY
सारे जहाँ से अ)छा
NETSQUARE
#RepublicDaY2K
NETSQUARE
# whoami - Saumil Shah
THE ACCIDENTAL ENTREPRENEUR
• 21 years in Infosec.
• M.S. Computer Science
Purdue University.
• LinkedIn: saumilshah
• Twitter: @therealsaumil
NETSQUARE
YEAR 2000
Pentium 3 ~ 800MHz / 256M Ram / 20GB
PCMCIA expansion, No USB
Mobile Charges
₹14 / minute
64Kbps 1:4
"compressed broadband"
The Dawn of WEB HACKING
Hardware Used:
Person to Person Communication: Internet Connectivity:
Emerging Trends in Cybersecurity:
NETSQUARE
EVOLUTION &
MOORE'S LAW
"THE NUMBER OF
COMPONENTS PER
INTEGRATED
CIRCUIT SHALL
DOUBLE EVERY
COUPLE OF YEARS"
NETSQUARE
Virginia Tech System X: Nov 2003
1100 PowerMac G5's
12 TFLOPS
#3 Supercomputer in the world,
November 2003
> 10 TFLOPS for < $10M
Dr. Srinidhi Varadarajan
NETSQUARE
NVIDIA AGX Xavier: Nov 2019
NETSQUARE
5 Minutes of Music
50MB 3.5MB
44.1KHz, Stereo 44.1KHz, Stereo
NETSQUARE
Evolution's Outcomes
NETSQUARE
2007
NETSQUARE
Again…Evolution
NETSQUARE
The Evolution of Attacks: 2001-19
NETSQUARE
Servers Applications Desktops
Browsers Pockets Minds
How Have Targets Shifted?
NETSQUARE
IP:Port
Applications
on HTTP
Broadband
Networks
HTML5
Wireless
Connectivity
Social
Networks
Target Enablers
NETSQUARE
Attacks Follow The Money
Defacement
and DDoS
ID Theft and
Phishing
Financial
Fraud
Targeted
APT
Ransomware
Cambridge
Analytica
NETSQUARE
Evolution Quiz:
NETSQUARE
NETSQUARE
FIREWALLS
IDS/IPS
ANTIVIRUS
WAF
DLP, EPS
DEP, ASLR
SANDBOX
EVOLUTION OF
DEFENSE 2001-19
DIFFERENT....
Reactive Approach
Block the Bad Things
and be Secure again
NETSQUARE
FIREWALLS
IDS/IPS
ANTIVIRUS
WAF
DLP, EPS
DEP, ASLR
SANDBOX
ONE-WAY ATTACK
FRAGROUTER
OBFUSCATION
CHAR ENCODING
DNS EXFIL
ROP, INFOLEAK
JAILBREAK
DIFFERENT.... BUT SAME SAME
NETSQUARE
Organizations have
plenty volunteers to add
layers of complexity…
…but few none for
attack surface reduction
and reducing privileged
code.
THOMAS DULLIEN,
"Why we are not building a
defendable Internet" BH ASIA 2O17
NETSQUARE
Security = "RISK REDUCTION"
Rules
Signatures
Updates
Machine Learning
NETSQUARE
NETSQUARE
Microsoft 2001
NETSQUARE
From: Bill Gates
Sent: Tuesday, January 15, 2002 5:22 PM
Subject: Trustworthy computing
Every few years I have sent out a memo
talking about the highest priority for
Microsoft. Two years ago, it was the
kickoff of our .NET strategy. Before
that, it was several memos about the
importance of the Internet to our future
and the ways we could make the Internet
truly useful for people.
Over the last year it has become clear
that ensuring .NET is a platform for
Trustworthy Computing is more important
than any other part of our work. If we
don't do this, people simply won't be
willing -- or able -- to take advantage
of all the other great work we do.
Trustworthy Computing is the highest
priority for all the work we are doing.
We must lead the industry to a whole new
level of Trustworthiness in computing.
NETSQUARE
NETSQUARE
2005: Ciscogate – Michael Lynn
https://www.schneier.com/blog/archives/2005/07/cisco_harasses.html
NETSQUARE 2009
CAN
SEC
WEST
Photo credit: Garrett Gee
NETSQUARE
Evolution of the Internet
Physical
Data Link
IP
TCP / UDP
Session
Presentation
Application INTEROPERABILITY
DECENTRALISED
NETSQUARE
Evolution of the Internet
HTTP
WEB 1.0
WEB 2.0
CLOUDSocial N/W
A.I.
SKYNET
HTTP IS THE
DATAGRAM OF THE
APPLICATION LAYER
THE MATRIX
VIRTUALISATION
MOORE'S LAW
BOSTON DYNAMICS
F.A.A.N.G.
NETSQUARE
NETSQUARE
NETSQUARE
A Brave New World
NETSQUARE
Where Do We Live?
#BREXIT
#US Elections
#CAA
…typing
NETSQUARE
PLANET CYBERSPACE
NATURE'S AND PHYSICS' LAWS
DON'T APPLY HERE.
NEITHER DO YOUR GOVERNMENTS'
NETSQUARE
Computerization, Discretion, Freedom
Sergey Bratus, Anna Shubina
December 31, 2015
Surveillance of social networking, pervasive user tracking in hopes of reaping
profits promised by “big data”, and ubiquitous failure to secure stockpiled
personal data went from being the concern of the few to making mainstream
media. We’ve learned that what hurts privacy is also likely to hurt freedom. But,
despite all these revelations, the worst and the most pervasive danger of
computerizing our everyday lives has so far avoided public attention: that
computers modify our behaviors related to discretion, professional autonomy, and,
ultimately, moral choice.
Computerization changes every area of human activity it touches, by bringing
new rules and new metrics. With enough of these at work, humans must act with an
eye to not just what they do (or should do) in the actual real-world situations, but also
to how it will look in the computer representation of it—and the latter are never
complete. And when they disagree, one must either spend the extra time and effort
“fighting the system”, bend the rules—or give up.
NETSQUARE
NETSQUARE
NETSQUARE Alberto Brandolini @ziobrando (The Bullshit Asymmetry)
NETSQUARE
THIS PERSON DOES NOT EXIST.COM
Social Network Neighbourhood
NETSQUARE
NETSQUARE
THE EVOLUTION OF
ARTIFICIAL INTELLIGENCE
NETSQUARE
NETSQUARE
CYBERSPACE BIOLOGY:
CELLS = PIXELS
• HUMAN FACULTIES FOR THREAT DETECTION
FAIL IN CYBERSPACE.
• FOR HUMANS, WHAT IS COMMON SENSE IN
REALITY IS IGNORANCE IN VIRTUALITY.
• FALSE SENSE OF SECURITY AND PRIVACY
THROUGH INEFFECTIVE INFOSEC PRODUCTS.
NETSQUARE
ELEMENTS OF A TRUSTWORTHY SYSTEM
TRANSPARENCY
METRICS
RESILIENCE
USERS
NETSQUARE
BANK STATEMENTS
Account
Activity
Spending
Record
Account
Reconciliation
Unauthorized
Expenses
NETSQUARE
Thomas Dullien
http://addxorrol.blogspot.com/2018/03/a-bank-statement-for-app-activity-and.html
"How could one empower users to account for
their private data, while at the same time helping
platform providers identify malicious software
better?
By providing users with the equivalent of a bank
statement for app/software activity. The way I
imagine it would be roughly as follows:
A separate component of my mobile phone (or
computer) OS keeps detailed track of app activity:
What peripherals are accessed at what times,
what files are accessed, etc."
A BANK STATEMENT FOR
APP/SOFTWARE ACTIVITY
NETSQUARE
NETSQUARE
PEBKAC
NETSQUARE
NETSQUARE
ROOT CAUSES OF "LACK OF TRUST"
• THE INTERNET WAS DESIGNED FOR U.S.
MILITARY COMMUNICATIONS. USER IDS
WERE NEVER A PART OF ITS DESIGN.
• ARE YOU ALLOWED TO DRIVE AN
UNREGISTERED CAR ON THE ROAD, AND
WITHOUT A DRIVERS' LICENSE?
NETSQUARE
numberofusers
infosec maturity
HOPELESS UNINFORMED PROACTIVE ROCK STARS
IDENTIFY YOUR TARGET USERS...
Always
going to be
an enigma.
If properly guided,
these users are willing
to improve their
usage habits.
The
next
Rock Star
users.
Leave them
alone, and
possibly
learn from them.
NETSQUARE
...AND IMPROVE THEIR MATURITYnumberofusers
infosec maturity
HOPELESS UNINFORMED PROACTIVE ROCK STARS
NETSQUARE
LET'S TALK ABOUT PASSWORDS
NETSQUARE https://xkcd.com/936
WE'VE SUCCESSFULLY TRAINED EVERYONE
TO USE PASSWORDS THAT ARE
HARD FOR HUMANS TO REMEMBER,
BUT EASY FOR COMPUTERS TO GUESS.
NETSQUARE
MAKE AUTHENTICATION GREAT AGAIN
NETSQUARE
PUT THE USER
IN CONTROL
NETSQUARE
NETSQUARE
NETSQUARE
RESIST
Pass The Parcel
Rules, Signatures,
Updates, Patches
The Next Short-Lived
Security Product
Encumber
Your Users
INFOSEC:
The business of
selling FEAR
NETSQUARE
RESONATE
Take Ownership
Build Defendable
Systems
Security and
Trustworthiness
as a core feature
EMPOWER
Your Users
INFOSEC:
The business of
enabling TRUST
NETSQUARE
JAI HIND
saumil@net-square.com
@therealsaumil

Contenu connexe

Tendances

Rapid Radical Change - Technologies Impact on Fitness & Wellness
Rapid Radical Change - Technologies Impact on Fitness & WellnessRapid Radical Change - Technologies Impact on Fitness & Wellness
Rapid Radical Change - Technologies Impact on Fitness & WellnessBryan K. O'Rourke
 
Ethics in development of Information Technology
Ethics in development of Information TechnologyEthics in development of Information Technology
Ethics in development of Information TechnologyAnKit Mhatre
 
Big data comes in small packages v1.2
Big data comes in small packages v1.2Big data comes in small packages v1.2
Big data comes in small packages v1.2Daniel Austin
 
Location: Trends, Ethics & Diversity
Location: Trends, Ethics & DiversityLocation: Trends, Ethics & Diversity
Location: Trends, Ethics & DiversityPLACE
 
Reading Group: Computer of the 21st Century
Reading Group: Computer of the 21st CenturyReading Group: Computer of the 21st Century
Reading Group: Computer of the 21st CenturyUCL-CS MobiSys
 
The computer for the 21st century
The computer for the 21st centuryThe computer for the 21st century
The computer for the 21st centuryFatih Özlü
 
The Power of Context and The Future of Digital Marketing
The Power of Context and The Future of Digital MarketingThe Power of Context and The Future of Digital Marketing
The Power of Context and The Future of Digital MarketingIvan Hernandez
 
Internet of things berbano k32
Internet of things  berbano k32Internet of things  berbano k32
Internet of things berbano k32kimberbano
 
Computers by heistking
Computers by heistkingComputers by heistking
Computers by heistkingheistking
 
UbiComp 2013 Talk on Device Dynamics at Home
UbiComp 2013 Talk on Device Dynamics at HomeUbiComp 2013 Talk on Device Dynamics at Home
UbiComp 2013 Talk on Device Dynamics at HomeFahim Kawsar
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItRob Manson
 
Techsec blog entry
Techsec blog entryTechsec blog entry
Techsec blog entryJemma Tracey
 
Connected World 2019 - chair's opening comments
Connected World 2019 - chair's opening commentsConnected World 2019 - chair's opening comments
Connected World 2019 - chair's opening commentsDavid Terrar
 
CIO Transformation Live - opening keynote - reframing the digital transformat...
CIO Transformation Live - opening keynote - reframing the digital transformat...CIO Transformation Live - opening keynote - reframing the digital transformat...
CIO Transformation Live - opening keynote - reframing the digital transformat...David Terrar
 
Mobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention Brussels 2014 - Kimo QuaintanceMobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention Brussels 2014 - Kimo QuaintanceMobile Convention
 
SXSW PANELPICKER - INTRODUCTION TO SUBJECT, NOT FINAL DECK
SXSW PANELPICKER - INTRODUCTION TO SUBJECT, NOT FINAL DECKSXSW PANELPICKER - INTRODUCTION TO SUBJECT, NOT FINAL DECK
SXSW PANELPICKER - INTRODUCTION TO SUBJECT, NOT FINAL DECKCynan Clucas
 
The Future of Social Media with 5G
The Future of Social Media with 5GThe Future of Social Media with 5G
The Future of Social Media with 5GIsmail Fahmi
 
General Smart Planet Overview
General  Smart Planet OverviewGeneral  Smart Planet Overview
General Smart Planet OverviewBradley Gilmour
 
Exponentials and Networks
Exponentials and NetworksExponentials and Networks
Exponentials and NetworksDavid Orban
 

Tendances (20)

Rapid Radical Change - Technologies Impact on Fitness & Wellness
Rapid Radical Change - Technologies Impact on Fitness & WellnessRapid Radical Change - Technologies Impact on Fitness & Wellness
Rapid Radical Change - Technologies Impact on Fitness & Wellness
 
Ethics in development of Information Technology
Ethics in development of Information TechnologyEthics in development of Information Technology
Ethics in development of Information Technology
 
Big data comes in small packages v1.2
Big data comes in small packages v1.2Big data comes in small packages v1.2
Big data comes in small packages v1.2
 
Location: Trends, Ethics & Diversity
Location: Trends, Ethics & DiversityLocation: Trends, Ethics & Diversity
Location: Trends, Ethics & Diversity
 
Reading Group: Computer of the 21st Century
Reading Group: Computer of the 21st CenturyReading Group: Computer of the 21st Century
Reading Group: Computer of the 21st Century
 
The computer for the 21st century
The computer for the 21st centuryThe computer for the 21st century
The computer for the 21st century
 
The Power of Context and The Future of Digital Marketing
The Power of Context and The Future of Digital MarketingThe Power of Context and The Future of Digital Marketing
The Power of Context and The Future of Digital Marketing
 
Internet of things berbano k32
Internet of things  berbano k32Internet of things  berbano k32
Internet of things berbano k32
 
Computers by heistking
Computers by heistkingComputers by heistking
Computers by heistking
 
Di Monte - Research Libraries and the Internet of Things
Di Monte - Research Libraries and the Internet of ThingsDi Monte - Research Libraries and the Internet of Things
Di Monte - Research Libraries and the Internet of Things
 
UbiComp 2013 Talk on Device Dynamics at Home
UbiComp 2013 Talk on Device Dynamics at HomeUbiComp 2013 Talk on Device Dynamics at Home
UbiComp 2013 Talk on Device Dynamics at Home
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
Techsec blog entry
Techsec blog entryTechsec blog entry
Techsec blog entry
 
Connected World 2019 - chair's opening comments
Connected World 2019 - chair's opening commentsConnected World 2019 - chair's opening comments
Connected World 2019 - chair's opening comments
 
CIO Transformation Live - opening keynote - reframing the digital transformat...
CIO Transformation Live - opening keynote - reframing the digital transformat...CIO Transformation Live - opening keynote - reframing the digital transformat...
CIO Transformation Live - opening keynote - reframing the digital transformat...
 
Mobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention Brussels 2014 - Kimo QuaintanceMobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention Brussels 2014 - Kimo Quaintance
 
SXSW PANELPICKER - INTRODUCTION TO SUBJECT, NOT FINAL DECK
SXSW PANELPICKER - INTRODUCTION TO SUBJECT, NOT FINAL DECKSXSW PANELPICKER - INTRODUCTION TO SUBJECT, NOT FINAL DECK
SXSW PANELPICKER - INTRODUCTION TO SUBJECT, NOT FINAL DECK
 
The Future of Social Media with 5G
The Future of Social Media with 5GThe Future of Social Media with 5G
The Future of Social Media with 5G
 
General Smart Planet Overview
General  Smart Planet OverviewGeneral  Smart Planet Overview
General Smart Planet Overview
 
Exponentials and Networks
Exponentials and NetworksExponentials and Networks
Exponentials and Networks
 

Similaire à NSConclave2020 The Decade Behind And The Decade Ahead

Cross Border Cyber Attacks: Impact on Digital Sovereignty
Cross Border Cyber Attacks: Impact on Digital SovereigntyCross Border Cyber Attacks: Impact on Digital Sovereignty
Cross Border Cyber Attacks: Impact on Digital SovereigntySaumil Shah
 
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...IRJET Journal
 
Smart systems manifesto: roadmap for the Internet of Things
Smart systems manifesto: roadmap for the Internet of ThingsSmart systems manifesto: roadmap for the Internet of Things
Smart systems manifesto: roadmap for the Internet of ThingsThe Marketing Distillery
 
Smart Systems and Internet of Things Manifesto
Smart Systems and Internet of Things ManifestoSmart Systems and Internet of Things Manifesto
Smart Systems and Internet of Things ManifestoHarbor Research
 
A database for the planet - Scot Chain Edinburgh - Nov 11, 2016
A database for the planet - Scot Chain Edinburgh - Nov 11, 2016A database for the planet - Scot Chain Edinburgh - Nov 11, 2016
A database for the planet - Scot Chain Edinburgh - Nov 11, 2016BigchainDB
 
Upsc science AND technology
Upsc   science AND technologyUpsc   science AND technology
Upsc science AND technologyGautam Kumar
 
Discover blockchain - WA state thought leader discussion
Discover blockchain - WA state thought leader discussionDiscover blockchain - WA state thought leader discussion
Discover blockchain - WA state thought leader discussionMark Mueller-Eberstein
 
Digital Networks & Platform Business Models (Masterclass)
Digital Networks & Platform Business Models (Masterclass)Digital Networks & Platform Business Models (Masterclass)
Digital Networks & Platform Business Models (Masterclass)Benjamin Tincq
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of ChunksIRJET Journal
 
GK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).pptGK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).pptPiyushRanjan269184
 
Narus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position PaperNarus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position PaperTrobough
 
Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research
 
Introducing the Internet of Things: lecture @IULM University
Introducing the Internet of Things: lecture @IULM UniversityIntroducing the Internet of Things: lecture @IULM University
Introducing the Internet of Things: lecture @IULM UniversityLeandro Agro'
 
Fraud Detection: A Review on Blockchain
Fraud Detection: A Review on BlockchainFraud Detection: A Review on Blockchain
Fraud Detection: A Review on BlockchainIRJET Journal
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNAMatteo Masi
 
Mathews blockchain presentation
Mathews blockchain presentationMathews blockchain presentation
Mathews blockchain presentationMichael Mathews
 

Similaire à NSConclave2020 The Decade Behind And The Decade Ahead (20)

Cross Border Cyber Attacks: Impact on Digital Sovereignty
Cross Border Cyber Attacks: Impact on Digital SovereigntyCross Border Cyber Attacks: Impact on Digital Sovereignty
Cross Border Cyber Attacks: Impact on Digital Sovereignty
 
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
 
IoT overview 2014
IoT overview 2014IoT overview 2014
IoT overview 2014
 
Smart systems manifesto: roadmap for the Internet of Things
Smart systems manifesto: roadmap for the Internet of ThingsSmart systems manifesto: roadmap for the Internet of Things
Smart systems manifesto: roadmap for the Internet of Things
 
Smart Systems and Internet of Things Manifesto
Smart Systems and Internet of Things ManifestoSmart Systems and Internet of Things Manifesto
Smart Systems and Internet of Things Manifesto
 
A database for the planet - Scot Chain Edinburgh - Nov 11, 2016
A database for the planet - Scot Chain Edinburgh - Nov 11, 2016A database for the planet - Scot Chain Edinburgh - Nov 11, 2016
A database for the planet - Scot Chain Edinburgh - Nov 11, 2016
 
Upsc science AND technology
Upsc   science AND technologyUpsc   science AND technology
Upsc science AND technology
 
MESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - UpdatedMESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - Updated
 
Discover blockchain - WA state thought leader discussion
Discover blockchain - WA state thought leader discussionDiscover blockchain - WA state thought leader discussion
Discover blockchain - WA state thought leader discussion
 
Digital Networks & Platform Business Models (Masterclass)
Digital Networks & Platform Business Models (Masterclass)Digital Networks & Platform Business Models (Masterclass)
Digital Networks & Platform Business Models (Masterclass)
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
 
GK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).pptGK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).ppt
 
Narus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position PaperNarus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position Paper
 
Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart Devices
 
Introducing the Internet of Things: lecture @IULM University
Introducing the Internet of Things: lecture @IULM UniversityIntroducing the Internet of Things: lecture @IULM University
Introducing the Internet of Things: lecture @IULM University
 
Fraud Detection: A Review on Blockchain
Fraud Detection: A Review on BlockchainFraud Detection: A Review on Blockchain
Fraud Detection: A Review on Blockchain
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Mathews blockchain presentation
Mathews blockchain presentationMathews blockchain presentation
Mathews blockchain presentation
 

Plus de Saumil Shah

The Hand That Strikes, Also Blocks
The Hand That Strikes, Also BlocksThe Hand That Strikes, Also Blocks
The Hand That Strikes, Also BlocksSaumil Shah
 
Debugging with EMUX - RIngzer0 BACK2WORKSHOPS
Debugging with EMUX - RIngzer0 BACK2WORKSHOPSDebugging with EMUX - RIngzer0 BACK2WORKSHOPS
Debugging with EMUX - RIngzer0 BACK2WORKSHOPSSaumil Shah
 
Unveiling EMUX - ARM and MIPS IoT Emulation Framework
Unveiling EMUX - ARM and MIPS IoT Emulation FrameworkUnveiling EMUX - ARM and MIPS IoT Emulation Framework
Unveiling EMUX - ARM and MIPS IoT Emulation FrameworkSaumil Shah
 
Announcing ARMX Docker - DC11332
Announcing ARMX Docker - DC11332Announcing ARMX Docker - DC11332
Announcing ARMX Docker - DC11332Saumil Shah
 
Precise Presentations
Precise PresentationsPrecise Presentations
Precise PresentationsSaumil Shah
 
Effective Webinars: Presentation Skills for a Virtual Audience
Effective Webinars: Presentation Skills for a Virtual AudienceEffective Webinars: Presentation Skills for a Virtual Audience
Effective Webinars: Presentation Skills for a Virtual AudienceSaumil Shah
 
INSIDE ARM-X Cansecwest 2020
INSIDE ARM-X Cansecwest 2020INSIDE ARM-X Cansecwest 2020
INSIDE ARM-X Cansecwest 2020Saumil Shah
 
INSIDE ARM-X - Countermeasure 2019
INSIDE ARM-X - Countermeasure 2019INSIDE ARM-X - Countermeasure 2019
INSIDE ARM-X - Countermeasure 2019Saumil Shah
 
Introducing ARM-X
Introducing ARM-XIntroducing ARM-X
Introducing ARM-XSaumil Shah
 
The Road To Defendable Systems - Emirates NBD
The Road To Defendable Systems - Emirates NBDThe Road To Defendable Systems - Emirates NBD
The Road To Defendable Systems - Emirates NBDSaumil Shah
 
The CISO's Dilemma 44CON 2019
The CISO's Dilemma 44CON 2019The CISO's Dilemma 44CON 2019
The CISO's Dilemma 44CON 2019Saumil Shah
 
The CISO's Dilemma HITBGSEC2019
The CISO's Dilemma HITBGSEC2019The CISO's Dilemma HITBGSEC2019
The CISO's Dilemma HITBGSEC2019Saumil Shah
 
Schrödinger's ARM Assembly
Schrödinger's ARM AssemblySchrödinger's ARM Assembly
Schrödinger's ARM AssemblySaumil Shah
 
ARM Polyglot Shellcode - HITB2019AMS
ARM Polyglot Shellcode - HITB2019AMSARM Polyglot Shellcode - HITB2019AMS
ARM Polyglot Shellcode - HITB2019AMSSaumil Shah
 
What Makes a Compelling Photograph
What Makes a Compelling PhotographWhat Makes a Compelling Photograph
What Makes a Compelling PhotographSaumil Shah
 
Make ARM Shellcode Great Again - HITB2018PEK
Make ARM Shellcode Great Again - HITB2018PEKMake ARM Shellcode Great Again - HITB2018PEK
Make ARM Shellcode Great Again - HITB2018PEKSaumil Shah
 
HackLU 2018 Make ARM Shellcode Great Again
HackLU 2018 Make ARM Shellcode Great AgainHackLU 2018 Make ARM Shellcode Great Again
HackLU 2018 Make ARM Shellcode Great AgainSaumil Shah
 
Hack.LU 2018 ARM IoT Firmware Emulation Workshop
Hack.LU 2018 ARM IoT Firmware Emulation WorkshopHack.LU 2018 ARM IoT Firmware Emulation Workshop
Hack.LU 2018 ARM IoT Firmware Emulation WorkshopSaumil Shah
 
Make ARM Shellcode Great Again
Make ARM Shellcode Great AgainMake ARM Shellcode Great Again
Make ARM Shellcode Great AgainSaumil Shah
 
ARM IoT Firmware Emulation Workshop
ARM IoT Firmware Emulation WorkshopARM IoT Firmware Emulation Workshop
ARM IoT Firmware Emulation WorkshopSaumil Shah
 

Plus de Saumil Shah (20)

The Hand That Strikes, Also Blocks
The Hand That Strikes, Also BlocksThe Hand That Strikes, Also Blocks
The Hand That Strikes, Also Blocks
 
Debugging with EMUX - RIngzer0 BACK2WORKSHOPS
Debugging with EMUX - RIngzer0 BACK2WORKSHOPSDebugging with EMUX - RIngzer0 BACK2WORKSHOPS
Debugging with EMUX - RIngzer0 BACK2WORKSHOPS
 
Unveiling EMUX - ARM and MIPS IoT Emulation Framework
Unveiling EMUX - ARM and MIPS IoT Emulation FrameworkUnveiling EMUX - ARM and MIPS IoT Emulation Framework
Unveiling EMUX - ARM and MIPS IoT Emulation Framework
 
Announcing ARMX Docker - DC11332
Announcing ARMX Docker - DC11332Announcing ARMX Docker - DC11332
Announcing ARMX Docker - DC11332
 
Precise Presentations
Precise PresentationsPrecise Presentations
Precise Presentations
 
Effective Webinars: Presentation Skills for a Virtual Audience
Effective Webinars: Presentation Skills for a Virtual AudienceEffective Webinars: Presentation Skills for a Virtual Audience
Effective Webinars: Presentation Skills for a Virtual Audience
 
INSIDE ARM-X Cansecwest 2020
INSIDE ARM-X Cansecwest 2020INSIDE ARM-X Cansecwest 2020
INSIDE ARM-X Cansecwest 2020
 
INSIDE ARM-X - Countermeasure 2019
INSIDE ARM-X - Countermeasure 2019INSIDE ARM-X - Countermeasure 2019
INSIDE ARM-X - Countermeasure 2019
 
Introducing ARM-X
Introducing ARM-XIntroducing ARM-X
Introducing ARM-X
 
The Road To Defendable Systems - Emirates NBD
The Road To Defendable Systems - Emirates NBDThe Road To Defendable Systems - Emirates NBD
The Road To Defendable Systems - Emirates NBD
 
The CISO's Dilemma 44CON 2019
The CISO's Dilemma 44CON 2019The CISO's Dilemma 44CON 2019
The CISO's Dilemma 44CON 2019
 
The CISO's Dilemma HITBGSEC2019
The CISO's Dilemma HITBGSEC2019The CISO's Dilemma HITBGSEC2019
The CISO's Dilemma HITBGSEC2019
 
Schrödinger's ARM Assembly
Schrödinger's ARM AssemblySchrödinger's ARM Assembly
Schrödinger's ARM Assembly
 
ARM Polyglot Shellcode - HITB2019AMS
ARM Polyglot Shellcode - HITB2019AMSARM Polyglot Shellcode - HITB2019AMS
ARM Polyglot Shellcode - HITB2019AMS
 
What Makes a Compelling Photograph
What Makes a Compelling PhotographWhat Makes a Compelling Photograph
What Makes a Compelling Photograph
 
Make ARM Shellcode Great Again - HITB2018PEK
Make ARM Shellcode Great Again - HITB2018PEKMake ARM Shellcode Great Again - HITB2018PEK
Make ARM Shellcode Great Again - HITB2018PEK
 
HackLU 2018 Make ARM Shellcode Great Again
HackLU 2018 Make ARM Shellcode Great AgainHackLU 2018 Make ARM Shellcode Great Again
HackLU 2018 Make ARM Shellcode Great Again
 
Hack.LU 2018 ARM IoT Firmware Emulation Workshop
Hack.LU 2018 ARM IoT Firmware Emulation WorkshopHack.LU 2018 ARM IoT Firmware Emulation Workshop
Hack.LU 2018 ARM IoT Firmware Emulation Workshop
 
Make ARM Shellcode Great Again
Make ARM Shellcode Great AgainMake ARM Shellcode Great Again
Make ARM Shellcode Great Again
 
ARM IoT Firmware Emulation Workshop
ARM IoT Firmware Emulation WorkshopARM IoT Firmware Emulation Workshop
ARM IoT Firmware Emulation Workshop
 

Dernier

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Dernier (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

NSConclave2020 The Decade Behind And The Decade Ahead