Keynote:- Side Channel Attacks: Lessons Learned or Troubles Ahead? by Daniel Genkin |
|
|
Keynote:- Cyber investigations: reading between the lines of Law enforcement press releases by Donatas Mazeika |
|
|
Bluetooth Low Energy GATT Fuzzing: from specification to implementation by Baptiste Boyer |
|
|
Fuzzing GPRS Layer-2 for Fun and Profit by Dyon Goos & Marius Muench |
|
|
Escaping the sandbox: Side Channel Shenanigans on Our DIY Chip by Jasper van Woudenberg |
|
|
ARM MTE: The End of Memory Corruption? Not Yet by Juhee Kim |
|
|
HAWKEYE – Recovering Symmetric Cryptography From Hardware Circuits by Julian Speith |
|
|
EL3XIR: Fuzzing COTS Secure Monitors by Marcel Busch & Christian Lindenmeier |
|
|
Is Your Memory Protected? Uncovering Hidden Vulnerabilities in Automotive MPU Mechanisms by Nimrod Stoler |
|
|
MIFARE Classic: exposing the static encrypted nonce variant by Philippe Teuwen |
|
|
Google Nest Wifi Pro Bypassing Android Verified Boot by Sergei Volokitin |
|
|
Byepervisor: How We Broke the PS5 Hypervisor by SpecterDev |
|
|
EUCLEAK by Thomas Roche |
|
|
Hacking EV charging stations via the charging cable by Wilco van Beijnum & Sebastiaan Laro Tol |
|
|
DramaQueen: Revisiting Side Channels in DRAM by Ben Gras |
|
|
Memory Security Retrospective by David Hulton |
|
|
From Rowhammer to GhostWrite: Advanced Exploitation and Discovery of Hardware Bugs by Fabian Thomas & Lukas Gerlach |
|
|
SILVER BULLET: solving Row Hammer entirely by Fabrice Devaux |
|
|
Sticky Tags Stop Spatial Memory Errors by Herbert Bos |
|
|
Looking Back at 10 Years of Rowhammer Exploits by Jonas Juffinger & Andreas Kogler |
|
|
Imaging and Reverse Engineering Sense Amplifiers in Modern DRAM by Michele Marazzi |
|
|
Future of Computer Architecture and Hardware Security by Onur Mutlu |
|
|
Hacking NAND Memory Pinout using Logic Analyzer by Sasha Sheremetov |
|
|