Spreading the load: building a better hardware hacking community by Kate Temkin |
|
|
Strategies to harden and neutralize UAV using RF DEW by Jose Lopes Esteves |
|
|
The Race to Secure Texas Instruments Graphing Calculators by Brandon Wilson |
|
|
It WISN't me, attacking industrial wireless mesh networks by Erwin Paternotte & Mattijs van Ommeren |
|
|
Smart car forensics and Sensor warfare by Gabriel Cirlig & Stefan Tanase |
|
|
There Goes Your PIN - Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting by David Berend |
|
|
TLBleed When Protecting Your CPU Caches Is Not enough by Ben Gras & Kaveh Razavi |
|
|
CXO Panel - Who needs IoT security certification? |
|
|
The Future of Hardware Security is in Open Standards by Helena Handschuh |
|
|
Z-Shave. Exploiting Z-Wave downgrade attacks by Andrew Tierney |
|
|
The undercover world of Reverse-Engineering based Integrated Circuit attacks by Olivier Thomas |
|
|
Wall Quiz Questions |
|
|
Wall Quiz Questions & Answers |
|
|
BLE Security Essentials by Slawomir Jasek |
|
|
Product security for IoT - mission impossible? by Axel Poschmann |
|
|
Black Box Is Dead. Long Live Black Box! by V. Kononovich And A.Stennikov |
|
|
Fault Injection On Automotive Diagnosis Protocols by Santiago Cordoba |
|
|
Bitfi - You Wouldn't Steal My Cloins by Andrew Tierney |
|
|