Black Hat Asia 2025 Review Board Panel
This video is a panel discussion featuring the Black Hat Asia 2025 review board members. The panelists discuss current trends in cybersecurity research, including the resurgence of traditional hacking techniques and the emergence of AI-related vulnerabilities. They provide insights into the submission and review process for conference talks, emphasizing the importance of clear storytelling and novel research findings. The discussion also touches on the challenges of hardware supply chain security and the role of AI in modern security operations.
Beyond the Hype: Why Hardware Supply Chain Security is the New Frontier
TLDR: The Black Hat Asia 2025 review board panel highlights a critical shift in research focus: the move from purely software-based exploits to the murky, often overlooked world of hardware supply chain security. While AI-related vulnerabilities are dominating headlines, the panel warns that the most persistent and dangerous threats remain in the foundational layers of our infrastructure. Pentesters and researchers should pivot their focus toward auditing hardware components and supply chain integrity, as these areas currently lack the maturity and scrutiny of modern web application security.
Security research often follows a predictable cycle of hype, where the industry collectively pivots toward the latest buzzword. This year, that word is AI. Every conference submission seems to feature a "jailbreak" or a prompt injection technique. However, the most seasoned researchers on the Black Hat Asia 2025 review board are looking past the noise. They are identifying a resurgence of interest in old-school hacking techniques applied to modern, complex hardware supply chains. This is not just about finding a buffer overflow in a legacy driver; it is about understanding how compromised components, malicious firmware, and opaque manufacturing processes are creating systemic risks that software-level security controls cannot touch.
The Reality of Hardware Supply Chain Risk
Hardware supply chain security is currently in a state of immaturity that resembles web security in the early 2000s. When a vendor integrates a third-party component into a server or an IoT device, they are inheriting the security posture of that component's manufacturer. If that manufacturer has poor internal controls, the vulnerability is baked into the hardware before it even reaches the end user.
The panel emphasized that this is not a theoretical problem. We are seeing a growing number of supply chain vulnerabilities where the attack surface is no longer just the code running on the device, but the device's very architecture. For a pentester, this means the traditional approach of scanning for open ports or testing API endpoints is insufficient. You are now tasked with verifying the integrity of the hardware itself, which requires a deep understanding of how these devices boot, communicate, and manage their own internal state.
Why AI is Not the Only Story
While the panel acknowledged the fascination with AI models, they were quick to point out that AI is often being used as a "bolt-on" to research that would otherwise be rejected. A submission that simply applies a generic LLM to a standard web vulnerability is rarely considered groundbreaking. The research that actually moves the needle is the work that explores the intersection of AI and hardware, or research that uses AI to automate the discovery of vulnerabilities in complex, non-standard protocols.
If you are looking to get a talk accepted or to find a high-impact bug, stop trying to force AI into every scenario. Instead, look at the OWASP Software Component Verification Standard and start applying those principles to the hardware you encounter during your engagements. The goal is to find the "AI plus something" research—where AI is a tool to solve a hard problem, not the subject of the research itself.
Practical Steps for the Modern Researcher
For those of us in the trenches, the takeaway is clear: we need to broaden our skill sets. If you are a web-focused pentester, you need to start learning how to interact with hardware interfaces. This means getting comfortable with tools like OpenOCD for debugging and JTAG access, or learning to analyze firmware images for backdoors and hardcoded credentials.
The panel noted that the most impressive research often comes from people who are willing to do the manual, tedious work that automation tools miss. When you are on an engagement, don't just look at the application layer. Ask yourself: what is the hardware running this? How was it manufactured? What are the potential points of failure in the supply chain that could allow an attacker to gain persistence at the firmware level?
The Future of Research Submissions
The review board is looking for storytelling. A brilliant technical finding is useless if you cannot explain why it matters to the broader ecosystem. The best submissions are those that frame the research as a narrative: here is the component, here is the assumption of trust, here is how that trust is broken, and here is the real-world impact.
If you are preparing a submission for next year, focus on the "why." Why is this specific hardware component vulnerable? Why does this matter to the average enterprise? If you can answer those questions while demonstrating a novel, manual exploitation technique, you will stand out. The industry is tired of "me-too" research. We need more people who are willing to dig into the hardware, challenge the assumptions of trust in our supply chains, and show us exactly where the cracks are. The next big vulnerability might not be in a line of code, but in the silicon itself. Start looking there.
Vulnerability Classes
Target Technologies
All Tags
Up Next From This Conference
Similar Talks

Hacking Apple's USB-C Port Controller

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom




