Keynote:- Side Channel Attacks: Lessons Learned or Troubles Ahead? by Daniel Genkin |
 |
|
Keynote:- Cyber investigations: reading between the lines of Law enforcement press releases by Donatas Mazeika |
 |
|
Bluetooth Low Energy GATT Fuzzing: from specification to implementation by Baptiste Boyer |
|
 |
Fuzzing GPRS Layer-2 for Fun and Profit by Dyon Goos & Marius Muench |
|
 |
Escaping the sandbox: Side Channel Shenanigans on Our DIY Chip by Jasper van Woudenberg |
|
 |
ARM MTE: The End of Memory Corruption? Not Yet by Juhee Kim |
|
 |
HAWKEYE – Recovering Symmetric Cryptography From Hardware Circuits by Julian Speith |
|
 |
EL3XIR: Fuzzing COTS Secure Monitors by Marcel Busch & Christian Lindenmeier |
 |
 |
Is Your Memory Protected? Uncovering Hidden Vulnerabilities in Automotive MPU Mechanisms by Nimrod Stoler |
 |
|
MIFARE Classic: exposing the static encrypted nonce variant by Philippe Teuwen |
 |
 |
Google Nest Wifi Pro Bypassing Android Verified Boot by Sergei Volokitin |
|
 |
Byepervisor: How We Broke the PS5 Hypervisor by SpecterDev |
 |
 |
EUCLEAK by Thomas Roche |
 |
 |
Hacking EV charging stations via the charging cable by Wilco van Beijnum & Sebastiaan Laro Tol |
 |
 |
DramaQueen: Revisiting Side Channels in DRAM by Ben Gras |
|
 |
Memory Security Retrospective by David Hulton |
|
|
From Rowhammer to GhostWrite: Advanced Exploitation and Discovery of Hardware Bugs by Fabian Thomas & Lukas Gerlach |
|
 |
SILVER BULLET: solving Row Hammer entirely by Fabrice Devaux |
|
|
Sticky Tags Stop Spatial Memory Errors by Herbert Bos |
|
|
Looking Back at 10 Years of Rowhammer Exploits by Jonas Juffinger & Andreas Kogler |
|
 |
Imaging and Reverse Engineering Sense Amplifiers in Modern DRAM by Michele Marazzi |
|
|
Future of Computer Architecture and Hardware Security by Onur Mutlu |
|
 |
Hacking NAND Memory Pinout using Logic Analyzer by Sasha Sheremetov |
|
 |