Thank you for your interest. Registration for workshop is now closed.
IoT Playground : Securing the Internet of Things (for students only)
The Internet of Things (IoT) connects a large number of communication and information systems to support and simplify everyday life by means of technology. The application domains in the IoT are diverse, spanning from medical and healthcare systems, building and home automation, transportation and logistics, media, and environmental monitoring, to infrastructure management and manufacturing—including smart wearable devices, smart home, smart city, smart environment, and smart enterprise devices—as well as human beings and animals as things in the IoT environment.
One of the key concerns for IoT devices are the privacy of the users using the IoT and the security of the IoT devices themselves, in this workshop participants will be exposed to some of the common security mistakes made by the industry when designing and implementing IoT devices. Participants will also get to try hacking some of the devices to understand how vulnerable they are, finally we will discuss possible mitigation techniques for the threats we have discovered.
- Date: 28 & 29 Jul 2016 (Thurs, Fri)
- Venue: SUTD, LEET lab, Building 1 Level 6 (1.612)
- Time: 9am to 5.30pm
Workshop objectives:
At the end of the workshop, participants will learn about the following through demonstrations and hands-on exercises:
- How an attacker performs data leakage attacks on an activity tracker and IP camera
- How an attacker accesses an IP camera remotely using common password cracking techniques
- How a compromised IP camera can be used to perform other malicious activities
- Common security flaws in the communication protocols such as Bluetooth
- How such security compromises affect the user’s privacy
The following hands-on exercises to meet the above objectives will be covered:
- Wireshark exercise (observing and making sense of wireless traffic)
- Brute forcing an encryption key
- Generating and breaking hashes
- Performing a distributed denial service (DOS) attack
Workshop agenda:
Time | Agenda |
9.30 – 10.30am | Introduction to Networking and Security |
10.30 – 10.45am | Tea break (light snacks and drinks provided) |
10.45 – 12.30am | Introduction to Ethical Hacking |
12.30 – 1.30pm | Lunch (provided) |
1.30 – 3.30pm | Compromising IoT Devices – Activity tracker (hands-on) |
3.30 – 345pm | Tea break (light snacks and drinks provided) |
3.45 – 4.45pm | Compromising IoT Devices – IP camera (hands-on) |
4.45 – 4.55pm | Closing |
4.55 – 5.25pm | Tour of iTrust labs |
5.25 – 5.30pm | Online workshop evaluation |
Workshop pre-requisite:
No prior knowledge is required, and computer workstations will be provided.
Presentation slides for the workshop are available for download here.
Directional map to LEET lab: