Keynote:- Hacking with AI: Our journey through the perils & promises by Dhinesh Manoharan |
![video button](https://hardwear.io/images/video-btn.png) |
|
Breaking Secure Boot on the Silicon Labs Gecko platform by Benoît Forgette & Sami Babigeon |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Basebanheimer: Now I Am Become Death, The Destroyer Of Chains by Daniel Komaromy |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Protect your screen from eavesdropping: don’t forget its power supply by Emmanuel Cottais |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Automated Fault Injection Attacks on Embedded Devices by Enrico Pozzobon & Nils Weiss |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer by Jonas Juffinger |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
TEEzz: Fuzzing Trusted Applications on COTS Android Devices by Marcel Busch |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Dissecting the Modern Android Data Encryption Scheme by Maxime Rossi Bellom & Damiano Melotti |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Triple Exploit Chain with Laser Fault Injection on a Secure Element by Olivier Heriveaux |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
How deep is the rabbit hole? A deep dive into exploitation of a popular smart speaker by Sergei Volokitin |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Understanding physics to break AES encryption with custom side-channel hardware by Stephan Mathieu & Roman Korkikian |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!' by Xeno Kovah |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Attacking Vehicle Fleet Management Systems by Yashin Mehaboobe & Ramiro Pareja Veredas |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Hacking a Smart Doorbell: An IoT hacking guide by Daniel Schwendner |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Wasefire, a secure firmware framework by Julien Cretin & Jean-Michel Picod |
|
|
A new future for IoT security: better solutions and what did not work so far by Dimitar Tomov, Guillaume Crinon and Nikita Veshchikov |
|
|