In this meet, Ajay pratap Singh delivered presentation on “Attacking and Crashing IoT Devices via Bluetooth LE protocol”,Monnappa K A presented on “Investigating Malware using Memory Forensics” and “Understanding APT1 malware techniques using malware analysis and reverse engineering”, Ajithkumar V presented on “Elliptic curve cryptography”, Abhishek J M presented on “Dissecting Android APK”, Amit Malik presented on “EMET evasion techniques detected in the wild”, Sameer Patil presented on “Exploits & Mitigations – Memory Corruption Techniques” and Veerababu Penugonda presented on “IOT Exploitation”.
Here is the link to presentations and video demonstrations:
- Attacking and Crashing IoT Devices via Bluetooth LE protocol
- Investigating Malware using Memory Forensics
- Elliptic curve cryptography
- Dissecting Android APK
- EMET evasion techniques detected in the wild
- Exploits & Mitigations – Memory Corruption Techniques
- IOT Exploitation
- Understanding APT1 malware techniques using malware analysis and reverse engineering
Here are the few snapshots from the session