BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.pacifichackers.com//ZHCF3M
BEGIN:VEVENT
UID:pretalx-hackthebay-2026-ZHCF3M@cfp.pacifichackers.com
DTSTART:20260323T131500Z
DTEND:20260323T140000Z
DESCRIPTION:AI models are increasingly delivered as compiled artifacts insi
 de firmware images and native binaries\, particularly in IoT\, OT\, and em
 bedded environments. While these deployment models improve performance and
  reduce operational dependencies\, they also create security blind spots t
 hat are poorly understood.\n\nThis session examines how AI models can be d
 iscovered and analyzed once deployed in embedded systems. The talk focuses
  on practical reverse engineering techniques used to identify model compon
 ents\, recover structural and behavioral information\, and understand the 
 risks introduced by different model packaging and compilation approaches. 
 Attendees will leave with a clearer view of how embedded AI expands the at
 tack surface and why it matters for both offensive and defensive security 
 work.
DTSTAMP:20260422T142916Z
LOCATION:TALKS
SUMMARY:Reverse Engineering Embedded AI Models in Firmware and Binaries - S
 tephen Brennan\, Ulrich Lang
URL:https://cfp.pacifichackers.com/hackthebay-2026/talk/ZHCF3M/
END:VEVENT
END:VCALENDAR
