This talk was presented at the virtual Arm Research Summit, September 9-11, 2020. This year's event explored global technology challenges across sustainability, security, and society, and attracted delegates from around the world for three days of innovative content.
This keynote talk gives an introduction into how hackers exploit memory corruption vulnerabilities in C/C++ software to compromise vulnerable IoT devices. It’s not feasible to eliminate all memory corruption vulnerabilities from software, but thankfully, not all hope is lost. Let’s take a look at examples of IoT attacks in the wild, and how exploit mitigations—simple, but often neglected, tools and techniques—can harden devices to give hackers a headache and make breaking in dramatically harder.
We hope to see you at the Arm Research Summit 2021, set to take place in the UK. Visit arm.com/summit to stay up to date and register your interest to attend or submit your work!