Skip to content

Referring sites and talks

Michael Messner edited this page Sep 10, 2025 · 104 revisions

2025

  • SANS Supply Chain Cybersecurity Forum 2025 - Unseen and Unsecured: Firmware Attacks Expanding the Enterprise Attack Surface - YouTube
Intro EMBA reference
image image

  • Embedded and IoT Devices Firmware Security - Article
Intro page EMBA reference
image image

  • An In-Depth Study of Smart Building Systems: Firmware Analysis and Device Emulation - Paper
Intro page EMBA reference
image image

  • Journey with EMBA: A Hardware Hacker's Perspective - LinkedIn

"Firmware analysis is both an art and a science. EMBA respects both sides; it has the technical depth for seasoned researchers and the automation to save time when quick answers are needed."

"For me, EMBA has transformed the most tedious part of my job into the most exciting. If you live in the world of firmware hacking, it’s not just worth trying it’s worth mastering."

image


  • 17th International Conference on Cyber Conflict: The Next Step - Vulnerability Patch Verification for Military Software Systems Through AI-Driven Code-Level Rule Generation - Paper
CCDCOE EMBA reference
image image

  • We Found Real Security Flaws in This Camera Firmware! - YouTube
YouTube YouTube
image image

  • EMBA Firmware Hacking Tutorial (2025) | Real-World Vulnerability Research for Hackers & Researchers - YouTube

image


  • Can I Hack My Own Router With This Tiny Tool? - YouTube

image


  • Challenges and pitfalls while emulating six current Icelandic household routers - Thesis (Bachelor's)
Intro page EMBA usage
image image

  • How Critical are Critical Vulnerabilities? - Drawing a Big Picture and Then Trying to Understand it - Blogpost

Hopefully this user will give us some feedback on the cool things of the commercial binarly solution which we are missing.

image


  • Dealing with Security and Privacy Challenges in Android through App Code Analysis - Paper
Intro page EMBA usage
image image

image


image


image


  • Top 15 Essential Open Source Cyber Security Tools for 2025 - Blog post

image

2024

  • Do you Trust your Device? Open Challenges in IoT Security Analysis - Paper
Intro page EMBA reference
image image

  • Industrial Embedded Systems Hardware Penetration Testing Course - Udemy course

image


  • NanoKVM vulnerability report based on EMBA run - Github issue

image


  • One Day Pentest - Post

image


  • Basics of EMBA: A Firmware Analyze Tool for Cybersecurity - Medium article

image


  • Reverse Engineering the Eufy Ecosystem: A Deep Dive into Security Vulnerabilities and Proprietary Protocols - Paper
Intro page EMBA note
image image

  • SET-TOP BOX RE: 6-PART SERIES - Blogpost

image


  • 0xFFF: Understanding Unknown Binaries - Firmware Recon - Blogpost
Main article Intro with EMBA shoutout
image image

  • Firmware Guide for Pen Testers - Blogpost

image


  • Crowdstrike: The Aftermath - PSW #836
PSW in action EMBA in the PSW
image image

  • THIS WEEK IN SECURITY: SNOWFLAKE, THE CVD TENSION, AND KASPERSKY’S EXIT — AND BREAKING BSOD - Hackaday weekly news
News overview EMBA in the weekly news
image image

  • CyMed: A Framework for Testing Cybersecurity of Connected Medical Devices - Paper [EN]
Paper abstract EMBA in the paper
image image

  • ECLYPSIUM TOOLBOX: EXTENDING SUPPLY CHAIN SECURITY TO NEW IT/OT/IOT DEVICES - Blog
Introduction Eclypsium Toolbox
image image

Introduction Evaluation of SBOM matching
image image

  • Using Open Source and Built-In Tools for Supply Chain Validation - Eclypsium webinar
Analyzing Firmware with EMBA EMBA Tips and Tricks
image image

  • Internet of Things Security: Firmware Approach - Paper

  • Corpus Christi: Establishing Replicability when Sharing the Bread is Not Allowed - Paper

  • A Crash Course in Hardware Hacking Methodology: The Ones and Zeros - Article

  • Packet Protector PP009: Don't Forget the Firmware - Podcast
PP009 EMBA reference
image image

  • 20 essential open-source cybersecurity tools that save you time - Article
Introduction EMBA reference
image image

  • LINUX SUPPLY CHAIN VALIDATION CHEAT SHEET - Blog
Introduction EMBA reference
image image

  • Blackbox-Fuzzing of IoT Devices Using the Router TL-WR902AC as Example - Paper
Introduction EMBA in the paper
image image

Agenda EMBA on stage
image image

  • SNHACK Attack: How Hackers Could Turn Your Smart Pet Feeder into an All-You-Can-Eat Buffet - Post
Paper intro EMBA reference
image image

  • FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware - Paper
Paper intro EMBA reference
image image

  • FLATLINED: ANALYZING PULSE SECURE FIRMWARE AND BYPASSING INTEGRITY CHECKING - Blog
Paper intro EMBA results
image image

  • Automated firmware security static analysis tools - Blog

image


  • Multiple vulnerabilities in Lantronix EDS-MD IoT gateway for medical devices - Pentagrid advisory

image


  • Difficulties in Dynamic Analysis of Drone Firmware and Its Solutions - Paper

image

2023

Paper init Firmware analysis
image image

Paper init EMBA intro
image image

  • EXPLORING EMBA: UNRAVELING FIRMWARE SECURITY WITH CONFIDENCE by Paul Asadoorian - Link

image


  • HELP NET SECURITY - EMBA: Open-source security analyzer for embedded devices - Link

image


  • Paul's Security Weekly - LogoFAIL, Default Passwords and Android Hacking – PSW #810

image


  • Unveiling Vulnerabilities: A Deep Dive into WiFi Camera Security - Link [EN]

image


image


  • 41 Open-source and Free Vulnerability Scanners For Pentesting and Web App Security - Link [EN]

Picture from live BruCON (thx to @twallutis) EMBA on the stream
image image

  • Software Bill of Materials (SBOM) in Practice - Link [EN]

  • Free IoT Security Seminar by KU Leuven - Web site [EN]
Training overview EMBA in Walkthrough documentation
image image

Training overview EMBA live in class
image image

  • Leveraging EMBA for Static Firmware Vulnerability Analysis in Physical Security Products - Blog post [EN]
Our Open-Source Initiative with EMBA Example report
image image

CVE-2023-22906: Introduction CVE-2023-22906: EMBA
image image

  • ISSA Talk by Nate Warfield - Building on Shaky Ground: Unveiling the Vulnerabilities of Firmware - Schedule/Slides [EN]
EMBA: Overview EMBA: Vulnerability Research

image


  • Small term paper on the topic of the Internet of Vulnerable Things by Tobias Müller - Hochschule Offenburg Paper/Github page [EN]

image


image


  • Shmoocon 2023 firetalk by Amit Serper - A 15-minute Crash Course to Building your Own IoT Hacking Lab at Home Schedule/Slides [EN]
Intro From a binary blob to a Linux filesystem

2022 and before

  • DEF CON 30 Talk by Jay Lagorio - Tear Down this Zywall: Breaking Open Zyxel Encrypted Firmware Schedule/Slides/Recording [EN]
DEF CON EMBA: The future

[Languages: DE = German / EN = English]
Clone this wiki locally