Opening Pandora’s Box: Effective Techniques for Reverse Engineering IoT Devices Conference Paper uri icon


  • Abstract With the growth of the Internet of Things, many insecure embedded devices are entering into our homes and businesses. Some of these web-connected devices lack even basic security protections such as secure password authentication. As a result, thousands of IoT devices have already been infected with malware and enlisted into malicious botnets and many more are left vulnerable to exploitation.

publication date

  • November 13, 2017