{"id":8427,"date":"2026-03-18T13:48:43","date_gmt":"2026-03-18T20:48:43","guid":{"rendered":"https:\/\/objectsecurity.com\/?p=8427"},"modified":"2026-03-18T13:50:43","modified_gmt":"2026-03-18T20:50:43","slug":"hackthebay_2026","status":"publish","type":"post","link":"https:\/\/objectsecurity.com\/hackthebay_2026\/","title":{"rendered":"ObjectSecurity Presents &#8220;Reverse Engineering Embedded AI Models in Firmware and Binaries&#8221;"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><div role=\"listitem\">\n<div class=\"\">\n<div aria-label=\"At 5:58 PM Tuesday, March 17, jason replied, &#96;&#96;&#96; ObjectSecurity will present at HackTheBay on the challenge of identifying AI functionality embedded directly in compiled software and firmware. As organizations add AI to software that runs in embedded and industrial environments, those components can become difficult to detect and assess once they are built into binaries. That creates a visibility problem for teams responsible for understanding what is running in their systems and how to evaluate the risk. The session will walk through how these components can show up in compiled code and what to look for during analysis. ObjectSecurity will also share observations from this work to help teams better recognize when AI may be present and start thinking about the associated risks. &#96;&#96;&#96;, message is saved\" id=\"rhsPost_n6j76oynm7gu8pyfy8duefqgwc\" data-testid=\"rhsPostView\" class=\"a11y__section post same--root post--comment post--thread\">\n<div class=\"post__content \" data-testid=\"postContent\">\n<div class=\"post__body\">\n<div class=\"AutoHeight\">\n<div class=\"post-message post-message--collapsed\">\n<div class=\"post-message__text-container\">\n<div id=\"rhsPostMessageText_n6j76oynm7gu8pyfy8duefqgwc\" class=\"post-message__text\" dir=\"auto\">\n<div class=\"post-code post-code--wrap\">\n<div class=\"hljs\">\n<p>ObjectSecurity will present at HackTheBay on the challenge of identifying AI functionality embedded directly in compiled software and firmware. As organizations add AI to software that runs in embedded and industrial environments, those components can become difficult to detect and assess once they are built into binaries. That creates a visibility problem for teams responsible for understanding what is running in their systems and how to evaluate the risk.<\/p>\n<p>The session will walk through how these components can show up in compiled code and what to look for during analysis. ObjectSecurity will also share observations from this work to help teams better recognize when AI may be present and start thinking about the associated risks.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"post__body-reactions-acks\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div>\n<div dir=\"ltr\">\n<div>\n<div>\n<div><\/div>\n<\/div>\n<div>\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div role=\"listitem\">\n<div class=\"\">\n<div aria-label=\"At 8:59 AM Wednesday, March 18, dan replied, great thank you, I'll get the blog page created this mornign, 1 reaction\" id=\"rhsPost_a6iu7fy9dtf3tb9ynt3wkgkggc\" data-testid=\"rhsPostView\" class=\"a11y__section post same--root current--user post--comment post--thread\">\n<div class=\"post__content \" data-testid=\"postContent\">\n<div class=\"post__img\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div ><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-1 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/cfp.pacifichackers.com\/hackthebay-2026\/talk\/review\/EEBYYMQBBJWRQAAPCJWF38SQLPQ9WDEJ\"><span class=\"fusion-button-text\">HackTheBay<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div ><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-2 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/contact\/\"><span class=\"fusion-button-text\">Contact Us<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div ><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-3 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/fortilayer\/\"><span class=\"fusion-button-text\">FortiLayer<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":8428,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[60,90,17,62,34,87],"tags":[],"class_list":["post-8427","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artificial-intelligence","category-education","category-event","category-machine-learning","category-reverse-engineering","category-tech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ObjectSecurity Presents &quot;Reverse Engineering Embedded AI Models in Firmware and Binaries&quot; - ObjectSecurity<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/hackthebay_2026\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/hackthebay_2026\\\/\"},\"author\":{\"name\":\"Dan Mathews\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"headline\":\"ObjectSecurity Presents &#8220;Reverse Engineering Embedded AI Models in Firmware and Binaries&#8221;\",\"datePublished\":\"2026-03-18T20:48:43+00:00\",\"dateModified\":\"2026-03-18T20:50:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/hackthebay_2026\\\/\"},\"wordCount\":3045,\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/hackthebay_2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Hackthebay-2026-FI.png?fit=600%2C337&ssl=1\",\"articleSection\":[\"Artificial Intelligence\",\"Education\",\"Event\",\"Machine Learning\",\"Reverse Engineering\",\"Technical\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/hackthebay_2026\\\/\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/hackthebay_2026\\\/\",\"name\":\"ObjectSecurity Presents \\\"Reverse Engineering Embedded AI Models in Firmware and Binaries\\\" - ObjectSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/hackthebay_2026\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/hackthebay_2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Hackthebay-2026-FI.png?fit=600%2C337&ssl=1\",\"datePublished\":\"2026-03-18T20:48:43+00:00\",\"dateModified\":\"2026-03-18T20:50:43+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/hackthebay_2026\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/objectsecurity.com\\\/hackthebay_2026\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/hackthebay_2026\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Hackthebay-2026-FI.png?fit=600%2C337&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Hackthebay-2026-FI.png?fit=600%2C337&ssl=1\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/hackthebay_2026\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/objectsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ObjectSecurity Presents &#8220;Reverse Engineering Embedded AI Models in Firmware and Binaries&#8221;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/\",\"name\":\"ObjectSecurity\",\"description\":\"OT\\\/ICS Asset Binary Vulnerability Analysis and Reporting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/objectsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\",\"name\":\"Dan Mathews\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"caption\":\"Dan Mathews\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ObjectSecurity Presents \"Reverse Engineering Embedded AI Models in Firmware and Binaries\" - ObjectSecurity","robots":{"index":"noindex","follow":"follow"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/objectsecurity.com\/hackthebay_2026\/#article","isPartOf":{"@id":"https:\/\/objectsecurity.com\/hackthebay_2026\/"},"author":{"name":"Dan Mathews","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"headline":"ObjectSecurity Presents &#8220;Reverse Engineering Embedded AI Models in Firmware and Binaries&#8221;","datePublished":"2026-03-18T20:48:43+00:00","dateModified":"2026-03-18T20:50:43+00:00","mainEntityOfPage":{"@id":"https:\/\/objectsecurity.com\/hackthebay_2026\/"},"wordCount":3045,"image":{"@id":"https:\/\/objectsecurity.com\/hackthebay_2026\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2026\/03\/Hackthebay-2026-FI.png?fit=600%2C337&ssl=1","articleSection":["Artificial Intelligence","Education","Event","Machine Learning","Reverse Engineering","Technical"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/objectsecurity.com\/hackthebay_2026\/","url":"https:\/\/objectsecurity.com\/hackthebay_2026\/","name":"ObjectSecurity Presents \"Reverse Engineering Embedded AI Models in Firmware and Binaries\" - ObjectSecurity","isPartOf":{"@id":"https:\/\/objectsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/objectsecurity.com\/hackthebay_2026\/#primaryimage"},"image":{"@id":"https:\/\/objectsecurity.com\/hackthebay_2026\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2026\/03\/Hackthebay-2026-FI.png?fit=600%2C337&ssl=1","datePublished":"2026-03-18T20:48:43+00:00","dateModified":"2026-03-18T20:50:43+00:00","author":{"@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"breadcrumb":{"@id":"https:\/\/objectsecurity.com\/hackthebay_2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/objectsecurity.com\/hackthebay_2026\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/objectsecurity.com\/hackthebay_2026\/#primaryimage","url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2026\/03\/Hackthebay-2026-FI.png?fit=600%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2026\/03\/Hackthebay-2026-FI.png?fit=600%2C337&ssl=1","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/objectsecurity.com\/hackthebay_2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/objectsecurity.com\/"},{"@type":"ListItem","position":2,"name":"ObjectSecurity Presents &#8220;Reverse Engineering Embedded AI Models in Firmware and Binaries&#8221;"}]},{"@type":"WebSite","@id":"https:\/\/objectsecurity.com\/#website","url":"https:\/\/objectsecurity.com\/","name":"ObjectSecurity","description":"OT\/ICS Asset Binary Vulnerability Analysis and Reporting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/objectsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d","name":"Dan Mathews","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","caption":"Dan Mathews"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2026\/03\/Hackthebay-2026-FI.png?fit=600%2C337&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/8427","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/comments?post=8427"}],"version-history":[{"count":2,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/8427\/revisions"}],"predecessor-version":[{"id":8431,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/8427\/revisions\/8431"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media\/8428"}],"wp:attachment":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media?parent=8427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/categories?post=8427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/tags?post=8427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}