Keynote:- Hacking with AI: Our journey through the perils & promises by Dhinesh Manoharan |
|
|
Breaking Secure Boot on the Silicon Labs Gecko platform by Benoît Forgette & Sami Babigeon |
|
|
Basebanheimer: Now I Am Become Death, The Destroyer Of Chains by Daniel Komaromy |
|
|
Protect your screen from eavesdropping: don’t forget its power supply by Emmanuel Cottais |
|
|
Automated Fault Injection Attacks on Embedded Devices by Enrico Pozzobon & Nils Weiss |
|
|
CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer by Jonas Juffinger |
|
|
TEEzz: Fuzzing Trusted Applications on COTS Android Devices by Marcel Busch |
|
|
Dissecting the Modern Android Data Encryption Scheme by Maxime Rossi Bellom & Damiano Melotti |
|
|
Triple Exploit Chain with Laser Fault Injection on a Secure Element by Olivier Heriveaux |
|
|
How deep is the rabbit hole? A deep dive into exploitation of a popular smart speaker by Sergei Volokitin |
|
|
Understanding physics to break AES encryption with custom side-channel hardware by Stephan Mathieu & Roman Korkikian |
|
|
Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!' by Xeno Kovah |
|
|
Attacking Vehicle Fleet Management Systems by Yashin Mehaboobe & Ramiro Pareja Veredas |
|
|
Hacking a Smart Doorbell: An IoT hacking guide by Daniel Schwendner |
|
|
Wasefire, a secure firmware framework by Julien Cretin & Jean-Michel Picod |
|
|
A new future for IoT security: better solutions and what did not work so far by Dimitar Tomov, Guillaume Crinon and Nikita Veshchikov |
|
|