Zero Days in Embedded Systems: Quantifying & Mitigating Hidden Risks to Critical Infrastructure

Watch on Demand: Zero Days in Embedded Systems & How to Quantify & Mitigate Risks

Access our on-demand webinar and learn about new research that is making it possible to quantify zero-day risk in embedded systems.

In this exclusive discussion hosted by RunSafe Security, we spoke to Ulf Kargén,

Assistant Professor at Linköping University, about research-backed methods for identifying exploit pathways such as Return-Oriented Programming (ROP) in embedded software and the use of his CReASE (Code Reuse Attack Surface Estimation) tool to measure zero-day risk.

Whether you manage SCADA systems, industrial control networks, or other critical infrastructure, this webinar will equip you with strategies to protect your most valuable systems by understanding the potential impact of future zero day exploits.

What You’ll Learn:

  • The impact of zero day exploits on critical infrastructure, supported by key statistics and real-world scenarios
  • Advanced techniques for anticipating, quantifying, and reducing zero-day risks in embedded software
  • CReASE (Code Reuse Attack Surface Estimation), a novel methodology for measuring “Zero-Day Risk” and identifying exploit pathways like Return-Oriented Programming (ROP)
  • Mitigation strategies to prevent the exploit of memory-based vulnerabilities and zero days

Interested in quantifying your zero-day risk?

The RunSafe Risk Reduction Analysis gives you insight into your exposure to CVEs and memory-based zero days and total risk reduction potential so you can take action to secure your embedded systems.

LEARN MORE

Download our Webinar

What Can RunSafe Security Do For You?

Exclusive Technology

Disrupt Attacker Economics

Remove the structure needed for reliable memory exploitation.

Cyber Bug

Reduce Attack
Surfaces

Neutralize Zero-Days with Moving Target Defense.

Systems Icon

Protect Key
Applications

Proactive Code Level Security to maintain original functionality and mitigate the attack.