Opening Note, Mr. Hans de Vries |
- |
 |
Sergey Bratus(Keynote) |
 |
- |
Hardware Implants for Flashy Lights and Root Shells by Joseph Fitzpatrick |
 |
- |
Hacking ATMs and Point of Sale a Look at devices used to attack ATMs and POS systems by Weston Hecker |
 |
- |
Reverse Engineering vehicles Burpsuite Style by Javier & Ferdi |
 |
 |
Electromagnetic Harmonic Attack on Transient Effect Ring Oscillator Based True Random Number Generator by Patrick Haddad |
 |
- |
How to make and break a Cortex-M3-based cryptographic token by Stefan Marsiske |
- |
- |
Security review of LoRaWAN neworks by Renaud Lifchitz |
- |
- |
Self driving cars and not so autonomous security by Nicolas Massaviol |
 |
 |
You Can't Update Hardware over the Air by Enno Rey |
 |
- |
Tower defense for hackers: Layered (in-)security for microcontrollers by Milosch |
 |
 |
How to fool an ADC, part II or attacks against sigma-delta data converters by Alexander Bolshev |
 |
- |
OLD SKEWL HACKING: DVB-T Black Button Pivot by Adam Laur |
 |
 |
Hardware Forensics Past, Present, Future by Ronald van der Knijff & Marcel Breeuwsma |
- |
- |
Dropping the MIC; picking up the keystore by Stefan Kiese |
 |
- |
Analyzing vehicle networks with CANToolz by Michael Elizarov |
 |
- |
CXO Panel 1 - The Path Toward IoT Security |
 |
- |
CXO Panel 2 - The state of medical device security |
- |
- |
Closing Note by Marie Moe |
- |
- |