BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.c3voc.de//camp2023//speaker//P9Y3FN
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-camp2023-PREGSS@pretalx.c3voc.de
DTSTART;TZID=CET:20230818T160000
DTEND;TZID=CET:20230818T164500
DESCRIPTION:We'll take a look at how DJI - dominating player for commercial
  and recreational drones - builds their software\, specifically from a sec
 urity angle. \n\nThis talk will discuss DJI drones\, most specifically the
  DJI Mini-series\; looking at the hardware\, discussing attack angles\, up
  to a full compromise of a current drone for custom firmware purposes.\n\n
 Along the way\, we'll look at a lot of security WTFs that allow to pwn the
 se devices. The amount and quality of bugs sometimes feel like you're trap
 ped in a very cool hardware CTF.\n\nWe'll go from sniffing hardware busses
 \, making fun of incorrect usage of SoC security features over to how DJI 
 consistently and knowingly violates the GPL\, into executing custom code o
 n the flight controller and Linux system.
DTSTAMP:20260315T145217Z
LOCATION:Milliways
SUMMARY:WTF DJI\, UAV CTF?! - A hacker's view at commercial drone security 
 - Felix Domke
URL:https://pretalx.c3voc.de/camp2023/talk/PREGSS/
END:VEVENT
END:VCALENDAR
