image image

Talks from 2015

Talks Video Link Presentation Link
Keynote by Jon Callas - download button
Keynote by Harald Welte - download button
got HW crypto? On the (in)security of a Self-Encrypting Drive series by Gunnar Alendal and Christian Kison - download button
Security of Medical Devices by Florian Grunow - -
Semantics-aware Intrusion Detection for Industrial Control Systems - download button
Hardware Hacking with the Beaglebone (Bl|H)ack by Joe FitzPatrick and Dominic spill and Jeremy richards - download button
Advanced Attack Methodologies against Security Microcontrollers by Marcus Janke and Dr. Peter Laackmann - download button
Workshop Hands-on introduction to Side Channel Analysis (SCA) by Lukasz Chmielewski & Rajesh Velegalati - -
Demystifying the Sagemcom ECGI420 OneBox by Tamir Bahar - -
Hacking Satellite TV receivers : Are those IoT devices secure? by Sofiane Talmat - download button
Attacking hardware for software reversers: Analysis of an encrypted HDD by Raphael RIGO and Joffrey CZARNY - download button
NSA Playset: Bridging the Airgap without Radios by Michael Leibowitz - download button
Workshop Kernel Tales - Testing security of Kernels for Embedded devices by fuzzing drivers by Vito Rallo - -
From off-the-shelf embedded devices to research platforms. Two case studies: a PLC and a SSD by Lucian Cojocar & Herbert Bos - download button
Advanced IC Reverse Engineering Techniques : In Depth Analysis of A Modern Smart Card by Olivier THOMAS - download button
Living in a fool's wireless-secured paradise by Stefan Kiese - download button

Training from 2015

  • 1. IC Security 101 by Oliver Thomas
  • 2. Low Level Hardware Reversing by Javier-Vazquez Vidal & Ferdinand
  • 3. Applied Phsical Attacks on X86 Systems by Joseph FitzPatrick

Sponsors from 2015

Gold Sponsors

Associate Sponsor

Lanyard Sponsor