Keynote:- Reverse Engineering is Good for Soul by Travis Goodspeed |
 |
|
An Overview of the Security of Some Hardware FIDO(2) Tokens by Dr. Victor Lomne |
 |
 |
Assessing the security of an SMM supervisor by Ilja van Sprundel |
 |
 |
How To Tame Your Robot by Jiska Classen & Fabian Freyer |
 |
|
HandPwning: security pitfalls of hand-geometry recognition-based access control systems by Luca Bongiorni |
 |
 |
Using EMC testing equipment as a new side channel acquisition technique by Nicolas Oberli & Benjamin Vernoux |
 |
 |
Blackbox fuzzing with side channels by Sergei Volokitin |
 |
 |
Rethinking Trusted Execution Environments in the Age of Reconfigurable Computing by Sérgio Pereira & Dr. Sandro Pinto |
 |
|
Popping Locks, Stealing Cars, and Breaking a Billion Other Things: Bluetooth LE Link Layer Relay Attacks by Sultan Qasim Khan |
 |
 |
Hardware attacks against SM4 in practice by Sylvain Pelissier & Nicolas Oberli |
 |
 |
Practical Invasive Attacks, How the Hardware is Hacked for Compatible Product Creation? by Thomas Olivier |
 |
|
Using a magic wand to break the iPhone's last security barrier by Tihmstar |
 |
 |
Bypass NXP LPC-Family debug check with Voltage Fault Injection by Waleed AlZamil & Bandar Alharbi |
 |
 |
Firmware Security Village by Christopher Krah & Jörg Stucke |
|
|
Two vulnerabilities per line of code: a low-cost side-channel story by Witold Waligora |
|
|
Go Below MMIO: Examining SPI flash transactions on Intel x86 systems by Xeno Kovah |
|
|
How can we make hardware bug bounties better? by Andreas Junestam, Victor Vuillard and Eduardo Vela |
 |
|