| Keynote:- When Threat Models Meet by Herbert Bos |
 |
|
| Blackboxing Diebold-Nixdorf ATMs by Vladimir Kononovich |
 |
 |
| Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks by Enrico Barberis & Hany Ragab |
 |
 |
| A Side Journey to Titan - Revealing and Breaking NXP’s P5x ECDSA Implementation on the Way by Dr. Victor Lomné |
 |
 |
| Over the Air-Tag: shenanigans with the most over-engineered keyfinder by Jiska Classen, Fabian Freyer and Stacksmashing |
 |
|
| Overmedicated: Breaking the security barrier of a B.Braun Infusion pump by Douglas McKee & Philippe Laulheret |
 |
 |
| EEPROM: It Will All End in Tears by Philippe Teuwen & Christian Herrmann |
 |
 |
| Teardown and feasibility study of IronKey - the most secure USB Flash drive by Sergei Skorobogatov |
 |
 |
| Flippin' fake flops for fun, fame and fortune by Jasper van Woudenberg |
 |
 |
| BlueMirror: Defeating Authentication in Bluetooth protocols by Tristan Claverie & Jose Lopes Esteves |
 |
|
| Automated vulnerability hunting in SMM using Brick by Assaf Carlsbad & Itai Liba |
 |
 |
| Divide & Conquer revisited: FI as a SW EXP primitive by Rafael Boix Carpi & Federico Menarini |
 |
 |
| Supply Chain Security (and attacks) by David Calligaris, Cristofaro Mune, Santos Merino & Jan Geertsma |
 |
|
| How do we build trustable open source hardware? by Trammell Hudson |
 |
|