OTRazor Static Code Analysis for Vulnerability Discovery in Industrial Automation Scripts

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=NNYrTYqg2lY



Duration: 39:58
3 views
0


Black Hat - USA - 2020
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-01-10Security Research on Mercedes Benz From Hardware to Car Control
2022-01-10The Dark Side of the Cloud How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis
2022-01-10An Unauthenticated Journey to Root Pwning Your Company's Enterprise Software Servers
2022-01-10The Devils in the Dependency Data Driven Software Composition Analysis
2022-01-10Mind Games Using Data to Solve for the Human Element Copy
2022-01-10Beyond Root Custom Firmware for Embedded Mobile Chipsets
2022-01-10The Paramedic's Guide to Surviving Cybersecurity
2022-01-10Operation Chimera APT Operation Targets Semiconductor Vendors
2022-01-10Detecting Fake 4G Base Stations in Real Time
2022-01-10TiYunZong Exploit Chain to Remotely Root Modern Android Devices Pwn Android Phones from 2015 2020
2022-01-10OTRazor Static Code Analysis for Vulnerability Discovery in Industrial Automation Scripts
2022-01-10Uncommon Sense Detecting Exploits with Novel Hardware Performance Counters and ML Magic
2022-01-10Discovering Hidden Properties to Attack the Node js Ecosystem
2022-01-10Plundervolt Flipping Bits from Software without Rowhammer
2022-01-10Virtually Private Networks
2022-01-10Dive into Apple IO80211FamilyV2
2022-01-10Policy Implications of Faulty Cyber Risk Models and How to Fix Them
2022-01-10Heroku Abuse Operations Hunting Wolves in Sheep's Clothing
2022-01-10Portable Document Flaws 101
2022-01-10Hiding Process Memory via Anti Forensic Techniques
2022-01-10How I Created My Clone Using AI Next Gen Social Engineering



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering