Opening Note

Hans de Vries

Hans de Vries

Head, National Cyber Security Centre (NCSC-NL)

 

Keynotes Speakers                                                       Closing note speakers


Milosch Meriac

Milosch Meriac

IoT & Hardware Security Expert

Sergey Bratus

Sergey Bratus

Research Associate Professor of Computer Science at Dartmouth College

Marie Moe

Marie Moe

Infosec hero and Infosec Associate Professor at SINTEF

Enno Rey

Enno Rey

Founder and Managing Director of ERNW GmbH

 

Speakers

Weston Hecker

Weston Hecker

Title: Hacking ATMs and Point of Sale a Look at devices used to attack ATMs and POS systems


Patrick Haddad

Patrick Haddad

Title : Electromagnetic Harmonic Attack on Transient Effect Ring Oscillator Based True Random Number Generator



Nicolas Massaviol

Nicolas Massaviol

Title: Self driving cars and not so autonomous security

Alexander Bolshev

Alexander Bolshev

Title: How to fool an ADC, part II or attacks against sigma-delta data converters


Adam Laurie

Adam Laurie

Title: OLD SKEWL HACKING: DVB-T Black Button Pivot



Stefan Kiese

Stefan Kiese

Title: Dropping the MIC; picking up the keystore

Renaud Lifchitz

Renaud Lifchitz

Title: Security review of LoRaWAN networks


Joseph FitzPatrick

Joseph FitzPatrick

Title: Hardware Implants for Flashy Lights and Root Shells

Javier Vazquez Vidal / Ferdinand

Javier Vazquez Vidal / Ferdinand

Title: Reverse Engineering vehicles Burpsuite Style


Michael Elizarov

Michael Elizarov

Title: Analyzing vehicle networks with CANToolz.


 

CXO Speakers

Katie Moussouris

Katie Moussouris

Founder & CEO, Luta Security

Claus Cramon Houmann

Claus Cramon Houmann

Community manager

Xander C.W. Heemskerk

Xander C.W. Heemskerk

Director Product Security - Philips

Robert Brown

Robert Brown

Marketing Director -Trustonic

Scott Erven

Scott Erven

Associate Director -Protiviti

Don A Bailey

Don A Bailey

Founder – Lab Mouse Security

Hannes Molsen

Hannes Molsen

Product Security Manager - Draeger

Jaya Baloo

Jaya Baloo

Chief Information Security Officer, KPN

 

Workshop


Binyamin Sharet

Binyamin Sharet

Title: Fuzzing USB Hosts with UMAP2


Ronald van der Knijff & Marcel Breeuwsma

Ronald van der Knijff & Marcel Breeuwsma

Title: Hardware Forensics, Past, Present, Future


Stefan Marsiske

Stefan Marsiske

Title: How to make and break a Cortex-M3-based cryptographic token


 

Trainings

Joseph FitzPatrick

Joseph FitzPatrick

Title: Applied Physical Attacks on X86 Systems

Olivier Thomas

Olivier Thomas
Title: Integrated Circuit Reverse Engineering 101

 (SOLD OUT)

 Javier-Vazquez-Vidal-round.png

Javier Vazquez Vidal / Ferdinand

 Title: Low level Hardware reversing (Basic)


                                             Endorsing Partner

 The Hague Security Deltanullsponsors endEuropol_EC3_RGB_transparent_Horizontal version

Networking Cocktail Sponsorship

 

 

Beyond Security

Badge Sponsor

Associate Sponsor

codewhite logo                                        Riscure_logo_RGB_Box_Green_Tagline IOActiveLogodiamond-microsoft


LANYARD SPONSOR

Supporting Sponsor

audius_Logo ARMmbed_blue_RGB

tshirt-contact-singapore


Community Partner


Media Partner

Hardwear Call For Papers Closed

hardwear.io is seeking innovative research on hardware security. If you have done interesting research on attacks or mitigation on any Hardware and want to showcase it to the security community, just submit your research paper. Please find all the relevant details for the submission below.

About hardwear.io

hardwear.io Security Conference is a platform for hardware and security community where researchers showcase and discuss their innovative research on attacking and defending hardware.
The objective of the conference revolves around four key concerns in hardware, firmware and related protocols i.e. backdoors, exploits, trust and attacks (BETA).

Dates

Training: 20th – 21st Sept 2016
Conference: 22nd – 23rd Sept 2016

Venue

Training:
The Hague Security Delta
Wilhelmina van Pruisenweg 104
2595 AN The Hague
The Netherlands

Conference:
NH DEN HAAG
Prinses Margrietplantsoen 100
2595 BR Den Haag
The Netherlands

General Queries: [email protected]
CFP Queries: [email protected]

Topics

hardwear accepts papers on any topic that discusses in-depth hardware and firmware security both from the offensive as well as defensive perspective. Some of the topics of interest include (but not limited to):

  • Integrated Circuits
  • Processors
  • Internet of Things/Smart Devices
  • Hardware crypto
  • Embedded Systems
  • Automobile, Aeroplane, train automation systems and hardware components
  • Industrial Control Systems/SCADA Systems
  • Satellite Systems
  • Medical Devices
  • Smartphone firmware, hardware
  • Firmware
  • Hardware pentesting
  • Trusted Platform Module
  • Radio communication Protocols and hardware
  • Hardware Trust and assurance algorithms
  • Multimedia hardware, firmware, protocols
  • Telecom Hardware/Networks
  • Electronic/Physical Locks

Categories

New Research (40 mins – 1 hr) – is a deep knowledge technical track that includes new research, vulnerabilities, zero days or exploits. And by new we really mean new i.e. if your research or talk has been published/showcased (partially or wholly) before, it will fall under current research category even though there are enhancements/changes to the original research.
Current Research (40 mins – 1 hr) – Comprises of known security issues, new research presented/published elsewhere, case studies, twist to an existing research, vulnerability, exploit or research-in-progress.
Tool (30 mins – 1 hr) – Comprises of open source security tools, exploits, hardware etc. This is an excellent opportunity for the original authors to showcase their work to the world.

Submission Format

Email the paper to: [email protected]
The subject should be: CFP EU 2016 <Paper Title>
Email Body:
Name
Handle
Talk Category (Mentioned above i.e. research/technical/tool)
Time required (including 5-10 mins of QA)
Paper Title
Country (and City) of residence
Organization and Designation
Contact Number
Have you presented or submitted this paper at any other conference(s) or magazine(s) or portals?
Yes, No.
If yes, where? and how this submission is different from the previous ones. Note that new research talks already given elsewhere or are due to be given elsewhere prior to hardwear.io will be considered as current research category talks unless they consist of cutting edge and ground breaking technology, which is at the judgment of the review committee.

Are you releasing an open source hardware(or specification)?
Yes/No.
(If yes, please include the design for review)

Are you releasing an exploit?
Yes/No.
(If yes, please include the source and vulnerability details for review)

Are you releasing a new vulnerability/Zero-day?
Yes/No.
(If yes, please send us the details, including reproduction procedure, for review)

Why do you think your paper is different/innovative and how does it qualify as new work/research(for new Research category only)?

Are there any live demonstrations (These earn you good points during review)?
Yes/No.
(If Yes, how many? Also please explain each demo)

Brief Profile ( less than or equal to 500 Words)
Paper Abstract – Please provide detailed working or your research/work. The more details you provide the better it is for the reviewers. Please keep the abstract to the point. Please do not try to hide the technical details or say “I can’t disclose it till bla bla” as it does not help the reviewers in any way and may give your paper a low score because of insufficient information available in the abstract. Please make sure to add as much technical details as possible as short abstracts also tend to get low score due to insufficient information.
Your high resolution photo (attached)

Note

Only the original authors should submit their research and any submission from a third party will be rejected. The Abstract should clearly mention the techniques and hacks in detail and merely mentioning that it works will not help in understanding the research to its full extent. Product/company marketing and pitches will be rejected. We request you not to submit any product specific talk.

Important Dates

  • CFP Opens: 5th April 2016
  • CFP Closing Date: 5th July 2016
  • Final list of speakers online: 15th July 2016
  • Training: 20th – 21st Sept 2016
  • Conference: 22nd – 23rd Sept 2016

Speaker Benefits

1) For the New Research Category

  1. Travel Reimbursement (Either actuals or the below mentioned amounts, whichever is less)
    a. Speaker travelling from outside Europe (Based on actuals or Euro 1000 whichever is less)
    b. Speaker travelling from within Europe (Based on actuals or Euro 250 whichever is less)
    c. If your employer can afford (or pays for) your travel, we will not reimburse anything from our end i.e. we will only reimburse if no one is sponsoring your travel.
    d. Please provide the receipts/invoice of the travel along with tickets for reimbursement.
  2. Complimentary Accommodation for 3 nights.
  3. Complimentary conference pass.
  4. Invitation to hardwear.io party.

2) For the Current Research and Tool Category

  1. Complimentary accommodation near the venue for 3 nights.
  2. Complimentary conference pass.
  3. Invitation to hardwear.io party.

* Only one speaker will be eligible for the benefits in case there are two or more speakers for a talk.
** By submitting a paper and agreeing to talk, the speaker gives hardwear.io the right to post, publish, re-distribute online and offline, soft and/or hard copies of his/her presentation material including slides, source code, design specifications, detailed paper and the recorded video of the talk.

Hardwear.io - Hardware Security Conference

In the age of automation, with billions of connected devices, hardware security plays a key role in enabling trust in the core technology and components of automation. There is a predominant need to create a platform for hardware security researchers and companies to brainstorm on breaking and securing hardware.

With that in mind, somewhere in the mid of 2014, amidst all the news and concerns surrounding trust and backdoors in hardware equipment, Hardwear was conceptualized to provide the IT and security community with a platform to discuss and solve issues pertaining to hardware security. The objective of the conference revolves around four key concerns in hardware, firmware and related protocols i.e. backdoors, exploits, trust and attacks (BETA).

Hardwear is owned and managed by the team behind nullcon – International Security Conference (http://nullcon.net). We started our journey of spreading knowledge in the information security industry with nullcon in 2010, which has now become one of the premier security events in Asia.

 

Review Board

  • Alex Gantman

    Alex Gantman

    Vice President of Engineering for Qualcomm Technologies Inc
  • Aseem Jakhar

    Aseem Jakhar

    Director - Payatu Technologies Pvt. Ltd
  • Don A Bailey

    Don A Bailey

    Founder / CEO - Lab Mouse Security
  • Jasper van Woundenberg

    Jasper van Woundenberg

    CTO - Riscure North America
  • Joseph FitzPatrick

    Joseph FitzPatrick

    Security Researcher at Hardware Security Resources LLC
  • Michael Ossmann

    Michael Ossmann

    Wireless Security Researcher
  • Murtuja Bharmal

    Murtuja Bharmal

    Director - Payatu Technologies Pvt. Ltd
  • Richo Healey

    Richo Healey

    Security Engineering at Stripe

Contact Form