Our career paths help you become job ready faster
Gain a Splash of New Skills - Coursera+ Annual Nearly 45% Off
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore groundbreaking cybersecurity research in this 13-minute conference presentation that unveils how attackers exploit the Tor network to anonymously target cloudless IoT devices. Learn about the development and implementation of TORCHLIGHT, an innovative detection tool that analyzes Tor traffic patterns to identify both known and unknown threats against Internet of Things devices operating without cloud dependencies. Discover how researchers processed 26 TB of traffic data over 12 months, uncovering 45 vulnerabilities including 29 zero-day exploits that received 25 CVE assignments across critical, high, medium, and low severity levels. Understand the methodology behind using virtual private server nodes for cost-effective threat detection and chain-of-thought processes with large language models for accurate threat identification. Examine the global impact of these findings, which affect approximately 12.71 million devices across 148 countries and expose them to severe security risks including information disclosure, authentication bypass, and arbitrary command execution. Gain insights into the shifting IoT landscape toward cloudless architectures and the emerging attack vectors that cybersecurity professionals must address to protect increasingly vulnerable connected devices.
Syllabus
USENIX Security '25 - TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices
Taught by
USENIX