Keynote:- When Threat Models Meet by Herbert Bos |
 |
|
Blackboxing Diebold-Nixdorf ATMs by Vladimir Kononovich |
 |
 |
Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks by Enrico Barberis & Hany Ragab |
 |
 |
A Side Journey to Titan - Revealing and Breaking NXP’s P5x ECDSA Implementation on the Way by Dr. Victor Lomné |
 |
 |
Over the Air-Tag: shenanigans with the most over-engineered keyfinder by Jiska Classen, Fabian Freyer and Stacksmashing |
 |
|
Overmedicated: Breaking the security barrier of a B.Braun Infusion pump by Douglas McKee & Philippe Laulheret |
 |
 |
EEPROM: It Will All End in Tears by Philippe Teuwen & Christian Herrmann |
 |
 |
Teardown and feasibility study of IronKey - the most secure USB Flash drive by Sergei Skorobogatov |
 |
 |
Flippin' fake flops for fun, fame and fortune by Jasper van Woudenberg |
 |
 |
BlueMirror: Defeating Authentication in Bluetooth protocols by Tristan Claverie & Jose Lopes Esteves |
 |
|
Automated vulnerability hunting in SMM using Brick by Assaf Carlsbad & Itai Liba |
 |
 |
Divide & Conquer revisited: FI as a SW EXP primitive by Rafael Boix Carpi & Federico Menarini |
 |
 |
Supply Chain Security (and attacks) by David Calligaris, Cristofaro Mune, Santos Merino & Jan Geertsma |
 |
|
How do we build trustable open source hardware? by Trammell Hudson |
 |
|