Keynote:- Reverse Engineering is Good for Soul by Travis Goodspeed |
|
|
An Overview of the Security of Some Hardware FIDO(2) Tokens by Dr. Victor Lomne |
|
|
Assessing the security of an SMM supervisor by Ilja van Sprundel |
|
|
How To Tame Your Robot by Jiska Classen & Fabian Freyer |
|
|
HandPwning: security pitfalls of hand-geometry recognition-based access control systems by Luca Bongiorni |
|
|
Using EMC testing equipment as a new side channel acquisition technique by Nicolas Oberli & Benjamin Vernoux |
|
|
Blackbox fuzzing with side channels by Sergei Volokitin |
|
|
Rethinking Trusted Execution Environments in the Age of Reconfigurable Computing by Sérgio Pereira & Dr. Sandro Pinto |
|
|
Popping Locks, Stealing Cars, and Breaking a Billion Other Things: Bluetooth LE Link Layer Relay Attacks by Sultan Qasim Khan |
|
|
Hardware attacks against SM4 in practice by Sylvain Pelissier & Nicolas Oberli |
|
|
Practical Invasive Attacks, How the Hardware is Hacked for Compatible Product Creation? by Thomas Olivier |
|
|
Using a magic wand to break the iPhone's last security barrier by Tihmstar |
|
|
Bypass NXP LPC-Family debug check with Voltage Fault Injection by Waleed AlZamil & Bandar Alharbi |
|
|
Firmware Security Village by Christopher Krah & Jörg Stucke |
|
|
Two vulnerabilities per line of code: a low-cost side-channel story by Witold Waligora |
|
|
Go Below MMIO: Examining SPI flash transactions on Intel x86 systems by Xeno Kovah |
|
|
How can we make hardware bug bounties better? by Andreas Junestam, Victor Vuillard and Eduardo Vela |
|
|