From Prey To Hunter: Transforming Legacy Embedded Devices Into Exploitation Sensor Grids

IDS researcher: 
Book, Journal, or Conference name: 
The 27th Annual Computer Security Applications Conference (ACSAC)
Pub date: 
2011/12/05
PDF: