Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

TORCHLIGHT - Shedding Light on Real-World Attacks on Cloudless IoT Devices

USENIX via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore groundbreaking cybersecurity research in this 13-minute conference presentation that unveils how attackers exploit the Tor network to anonymously target cloudless IoT devices. Learn about the development and implementation of TORCHLIGHT, an innovative detection tool that analyzes Tor traffic patterns to identify both known and unknown threats against Internet of Things devices operating without cloud dependencies. Discover how researchers processed 26 TB of traffic data over 12 months, uncovering 45 vulnerabilities including 29 zero-day exploits that received 25 CVE assignments across critical, high, medium, and low severity levels. Understand the methodology behind using virtual private server nodes for cost-effective threat detection and chain-of-thought processes with large language models for accurate threat identification. Examine the global impact of these findings, which affect approximately 12.71 million devices across 148 countries and expose them to severe security risks including information disclosure, authentication bypass, and arbitrary command execution. Gain insights into the shifting IoT landscape toward cloudless architectures and the emerging attack vectors that cybersecurity professionals must address to protect increasingly vulnerable connected devices.

Syllabus

USENIX Security '25 - TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices

Taught by

USENIX

Reviews

Start your review of TORCHLIGHT - Shedding Light on Real-World Attacks on Cloudless IoT Devices

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.