Exploitation Against the Clock: Xiaomi S3 Smartwatch
Sergei Volokitin | Day 1, 11:25am - 12:10pm
Abstract
This talk dives into the detailed process of uncovering hardware vulnerabilities, from target selection and attack surface analysis to vulnerability discovery and exploitation—all accomplished within just four days during HardPwn NL 2024.
Focusing on two Xiaomi devices, the Outdoor Camera and the latest Smartwatch, the presentation will explore their internal architecture and highlight the reverse engineering efforts undertaken to identify critical security mechanisms.
The talk will showcase five distinct vulnerabilities which include the potential to retrieve user data, extract security tokens, bypass the lock screen, and even recover the user PIN, granting a potential attacker full control over the device.
The Speaker(s)

Sergei Volokitin
Sergei Volokitin is an independent Security Researcher at Hexplot in the Netherlands where his work is mostly focused on security testing of embedded systems and mobile devices. He has a number of publications on Java Card platform attacks and conference presentations on hardware security, TEEs and exploitation of secure devices.