From the cybersecurity perspective, I'll introduce some basics on smart devices and give overview of the infrastructural landscape in their vicinity. Next I'll present basic attack vectors on embedded systems and show how they can be utilized by malicious attackers to take over internet connected aswell as air-gapped systems. After elaborating on potential consequences of such attacks, I'll give insights into the concepts behind fundamental countermeasures like privilege separation and code signing.
Wolfgang Noll is a member of TUEV Rheinland's team of White Hat Hackers. He helps customers to identify security weaknesses in their systems and products by utilizing the same methods of enumeration and exploitation as malicious adversaries. He is particularly interested in the inner workings of information technologies at the lowest layers and specializes in the field of Internet-of-Things and embedded systems.