| Spreading the load: building a better hardware hacking community by Kate Temkin |
|
 |
| Strategies to harden and neutralize UAV using RF DEW by Jose Lopes Esteves |
|
 |
| The Race to Secure Texas Instruments Graphing Calculators by Brandon Wilson |
|
 |
| It WISN't me, attacking industrial wireless mesh networks by Erwin Paternotte & Mattijs van Ommeren |
|
 |
| Smart car forensics and Sensor warfare by Gabriel Cirlig & Stefan Tanase |
|
 |
| There Goes Your PIN - Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting by David Berend |
|
 |
| TLBleed When Protecting Your CPU Caches Is Not enough by Ben Gras & Kaveh Razavi |
|
 |
| CXO Panel - Who needs IoT security certification? |
|
|
| The Future of Hardware Security is in Open Standards by Helena Handschuh |
|
|
| Z-Shave. Exploiting Z-Wave downgrade attacks by Andrew Tierney |
|
|
| The undercover world of Reverse-Engineering based Integrated Circuit attacks by Olivier Thomas |
|
|
| Wall Quiz Questions |
|
|
| Wall Quiz Questions & Answers |
|
|
| BLE Security Essentials by Slawomir Jasek |
|
 |
| Product security for IoT - mission impossible? by Axel Poschmann |
|
|
| Black Box Is Dead. Long Live Black Box! by V. Kononovich And A.Stennikov |
|
|
| Fault Injection On Automotive Diagnosis Protocols by Santiago Cordoba |
|
|
| Bitfi - You Wouldn't Steal My Cloins by Andrew Tierney |
|
|