Warning: Creating default object from empty value in /home/users/mest/htdocs/wp-content/themes/bizlite-pro/admin/redux/ReduxCore/inc/class.redux_filesystem.php on line 28
IoT Security Hands-on Training – Binary Analysis Using Open Source Toolset – MEST Center

Recognize the need for privacy and security protection on IoT with hands-on practices to better understand a security-oriented IoT design procedure

1:00pm to 4:00pm PST

Monday, March 16, 2020

The 11th Trusted Supplier Industry Day at GOMACTech 2020

If attending GOMACTech, take advantage of this opportunity to participate in this training.

Presenter: Dr. Yier Jin, FICS Research / University of Florida

Who can attend: Only open to government agencies

To register email: Amanda Moscrip at amosc989@ufl.edu, include name, affiliation, and name of the organization.

Deadline: Register ASAP – Seating is limited.

Description:

Within the past decade, the number of IoT devices introduced in the market has increased dramatically. However, the massive deployment of IoT devices has led to significant security and privacy concerns given that security is often treated as an afterthought for IoT systems. Security issues may come at different levels, from deployment issues that leave devices exposed to the internet with default credentials, to implementation issues where manufacturers incorrectly employ existing protocols or develop proprietary ones for communications that have not been examined for their sanity.

In this tutorial, I will introduce the emerging security and privacy challenges in the IoT domain ranging from those threats to individual devices to IoT botnet. I will introduce the basic hacking skills as well as the defense solutions countering these attacks. The tutorial is designed to have attendees become acquainted with IoT security. After attending this tutorial, students will be able to understand or master IoT security related to hardware, system and networking. The recited topics include introduction to IoT, IoT Application – smart home, and attacks against IoT. The attendees will also get familiar with open-source binary analysis tools.

Intended Learning Outcomes (ILOs)

Upon the completion of this presentation, attendees should be able to:

  • Understand the existing IoT security and privacy challenges
  • Hands-on experience with the basic procedure of IoT binary analysis to identify the IoT security vulnerabilities
  • Hands-on experience with hardware-software co-design for IoT security

Target Audience

Design engineers, senior undergraduate students, graduate students, and decision-makers who are interested in understanding the sources of IoT-related security attacks, the state-of-the-art methods in their prevention, and remaining challenges.