About this event
Real-Time Operating Systems (RTOS) power millions of connected devices across industrial, medical, automotive, and IoT environments. Yet for many manufacturers and security teams, RTOS firmware remains a black box.
Often delivered by OEMs, inherited from legacy projects, or provided without source code, RTOS firmware offers little transparency into the software components it contains. This lack of visibility makes it difficult to generate reliable SBOMs, track vulnerabilities, and meet growing regulatory requirements such as the RED Delegated Act and the Cyber Resilience Act (CRA).
In this 45-minute webinar, we will show how enhanced binary analysis enables full component visibility inside RTOS firmware — including kernel versions, crypto libraries, network stacks, and standard libraries — without requiring source code.
You will learn:
The session will include a live demonstration of analyzing an RTOS firmware image and generating a complete SBOM.
If you rely on RTOS-based devices and need better visibility for security and compliance, this webinar is for you.
Can’t make it live? No worries—register now, and we’ll send you the on-demand recording.
Hosted by
Quentin Kaiser is an ex-penetration tester who turned binary analysis nerd. He's currently working as a security researcher at the ONEKEY Research Lab, where he focuses on binary exploitation of embedded devices and bug finding automation within large firmware.
In his current role, Max helps enterprises automate and continuously monitor the security aspects of their embedded devices, using binary analysis, software bill of materials, and CI/CD pipeline integration.
ONEKEY is a specialist for Product Cybersecurity for IoT & OT. Using automatically generated "Digital Twins" and "Software Bill of Materials" of devices, ONEKEY analyzes firmware for security vulnerabilities & compliance violations, without source code, device, or network access.