itrust-logo

Thank you for your interest. Registration for workshop is now closed.

IoT Playground : Securing the Internet of Things (for students only)

The Internet of Things (IoT) connects a large number of communication and information systems to support and simplify everyday life by means of technology. The application domains in the IoT are diverse, spanning from medical and healthcare systems, building and home automation, transportation and logistics, media, and environmental monitoring, to infrastructure management and manufacturing—including smart wearable devices, smart home, smart city, smart environment, and smart enterprise devices—as well as human beings and animals as things in the IoT environment.

One of the key concerns for IoT devices are the privacy of the users using the IoT and the security of the IoT devices themselves, in this workshop participants will be exposed to some of the common security mistakes made by the industry when designing and implementing IoT devices. Participants will also get to try hacking some of the devices to understand how vulnerable they are, finally we will discuss possible mitigation techniques for the threats we have discovered.

  • Date: 28 & 29 Jul 2016 (Thurs, Fri)
  • Venue: SUTD, LEET lab, Building 1 Level 6 (1.612)
  • Time: 9am to 5.30pm

Workshop objectives:

At the end of the workshop, participants will learn about the following through demonstrations and hands-on exercises:

  1.  How an attacker performs data leakage attacks on an activity tracker and IP camera
  2.  How an attacker accesses an IP camera remotely using common password cracking techniques
  3.  How a compromised IP camera can be used to perform other malicious activities
  4.  Common security flaws in the communication protocols such as Bluetooth
  5.  How such security compromises affect the user’s privacy

The following hands-on exercises to meet the above objectives will be covered:

  1.  Wireshark exercise (observing and making sense of wireless traffic)
  2.  Brute forcing an encryption key
  3.  Generating and breaking hashes
  4.  Performing a distributed denial service (DOS) attack

Workshop agenda:

Time Agenda
9.30 – 10.30am Introduction to Networking and Security
10.30 – 10.45am Tea break (light snacks and drinks provided)
10.45 – 12.30am Introduction to Ethical Hacking
12.30 – 1.30pm Lunch (provided)
1.30 – 3.30pm Compromising IoT Devices – Activity tracker (hands-on)
3.30 – 345pm Tea break (light snacks and drinks provided)
3.45 – 4.45pm Compromising IoT Devices – IP camera (hands-on)
4.45 – 4.55pm Closing
4.55 – 5.25pm Tour of iTrust labs
5.25 – 5.30pm Online workshop evaluation

Workshop pre-requisite:

No prior knowledge is required, and computer workstations will be provided.

Presentation slides for the workshop are available for download here.

Directional map to LEET lab:

iot_workshop_map