DTM COMPONENTS: SHADOW KEYS TO THE ICS KINGDOM
HART (in)security: how one transmitter can compromise whole plant.
With BIGDATA comes BIG Responsibility: Practical exploiting of MDX injections
SSRF DoS relaying
HART As An Attack Vector: From Current Loop to Application Layer
ICSCorsair: How I will PWN your ERP through 4-20 mA current loop
S4x15: how to fuzz 100+ industrial DTMs and stay alive
SCADA and mobile (BlackHat London Mobile Security Summit 2015)
Never Trust Your Inputs
Never Trust Your Inputs or how to fool an ADC
When the medicine is more dangerous than the disease: Mobile Antivirus Security Assessment