Talk Title: Hacking IoT devices: A story of stealing fingerprints


IoT devices are often resource-constrained, so we may forego certain security features because they aren’t essential to the use-case. But what if the authentication mechanisms in these devices are used in other, more critical scenarios as well? Discover how smart devices can be turned into wireless biometric thieves in this talk which explores a combination of cryptography, hardware hacking and reverse engineering.