Flip a bit, grab a key: symbolic execution edition by Jasper van Woudenberg |
|
|
Reverse Engineering of Programmable Logic Bitstreams by Andrew Zonenberg |
|
|
Shaking trust in hardware: Attacks on hardware from software, Rowhammer and an MMU side channel from Javascript by Ben Gras & Kaveh Razavi |
|
|
A Ghost in your Transmitter: analyzing polyglot signals for physical layer covert channels detection by Jose Lopes Esteves, Emmanuel Cottais, Chaouki Kasmi |
|
|
Challenging real-world targets: from iPhone to insulin pump by Dr. Sergei Skorobogatov |
|
|
Latest Metasploit Hardware Bridge Techniques by Craig Smith |
|
|
The RTOS Exploit Mitigation Blues by Jos Wetzels |
|
|
Hardware Root of Mistrust by Joseph FitzPatrick |
|
|
Hardware Trojans and the Internet of Things by Christof Paar |
|
|
Automated Unpacking, Analysis and Comparision of Arbitrary Firmware Images: The Firmware Analysis and Compare Tool (FACT) by Johannes vom Dorp |
- |
|
KERNELFAULT: Pwning Linux using Hardware Fault Injection by Niek Timmers & Cristofaro Mune |
|
|
TEMPEST attacks against AES by Craig Ramsay |
|
|
Latest Metasploit Hardware Bridge Techniques by Craig Smith |
|
|
Black Box Debugging of Embedded Industrial Control Systems by Alexandru Ariciu & Robin Massink |
- |
|
Hack your body, one implant at a time by Patrick Paumen |
|
|
CXO Panel: UnDependable Dependencies In Safety Critical Infrastructure |
|
- |
CXO Panel: Who Owns Your Car? by Dr. Ana Magazinius, Abe Chen, Craig Smith |
|
- |
To Guess Wrong Is Expensive by Sarani Bhattacharya |
|
- |