We propose and demonstrate an IoT Honeypot framework based on the open source automatedmalware analysis system Cuckoo Sandbox [3] that’s capable of emulating such IoT devices. By attaching the emulated IoT instance(s) to the internet, either in internal networks or using public IP addresses, an attacker may decide to target their campaign at the emulated IoT devices, allowing our IoT Honeypot to detect & analyze the payloads and attack methods. The IoTHoney framework allows organizations to run IoT-focused honeypots tailored to their organization.


Presentation Pieter Jansen Jurriaan Bremer


time: 12:20
speakers: Pieter Jansen, Jurriaan Bremer

Other sessions:

Constraints for Code: an Economic Analysis of Policies for Secure Digital Products

Disrupting Financial Cybercrime

Digital disease: clinical simulations of hacked devices

Let’s go Dutch – DCB + NBIP

Modern Pentest Tricks