Why Hackers Want You to Patch
The attacker/defender paradigm assumes the attackers need only one vulnerable path, while the defender must find and patch them all. The endless patching loop is ineffective, exhausting, and expensive. In this session, we will explore the attackers' perspective, how they target IoT weaknesses and why the current loop of patching is ineffective. We will propose a new approach for how IoT device manufacturers can flip the power back to their hands: deterministic self-protection and exploitation prevention.
Room 1The attacker/defender paradigm assumes the attackers need only one vulnerable path, while the defender must find and patch them all. The endless patching loop is ineffective, exhausting, and expensive. In this session, we will explore the attackers' perspective, how they target IoT weaknesses and why the current loop of patching is ineffective. We will propose a new approach for how IoT device manufacturers can flip the power back to their hands: deterministic self-protection and exploitation prevention.