Keynote:- When Threat Models Meet by Herbert Bos |
![video button](https://hardwear.io/images/video-btn.png) |
|
Blackboxing Diebold-Nixdorf ATMs by Vladimir Kononovich |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks by Enrico Barberis & Hany Ragab |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
A Side Journey to Titan - Revealing and Breaking NXP’s P5x ECDSA Implementation on the Way by Dr. Victor Lomné |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Over the Air-Tag: shenanigans with the most over-engineered keyfinder by Jiska Classen, Fabian Freyer and Stacksmashing |
![video button](https://hardwear.io/images/video-btn.png) |
|
Overmedicated: Breaking the security barrier of a B.Braun Infusion pump by Douglas McKee & Philippe Laulheret |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
EEPROM: It Will All End in Tears by Philippe Teuwen & Christian Herrmann |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Teardown and feasibility study of IronKey - the most secure USB Flash drive by Sergei Skorobogatov |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Flippin' fake flops for fun, fame and fortune by Jasper van Woudenberg |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
BlueMirror: Defeating Authentication in Bluetooth protocols by Tristan Claverie & Jose Lopes Esteves |
![video button](https://hardwear.io/images/video-btn.png) |
|
Automated vulnerability hunting in SMM using Brick by Assaf Carlsbad & Itai Liba |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Divide & Conquer revisited: FI as a SW EXP primitive by Rafael Boix Carpi & Federico Menarini |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Supply Chain Security (and attacks) by David Calligaris, Cristofaro Mune, Santos Merino & Jan Geertsma |
![video button](https://hardwear.io/images/video-btn.png) |
|
How do we build trustable open source hardware? by Trammell Hudson |
![video button](https://hardwear.io/images/video-btn.png) |
|