Keynote: Exposing the deep secure elements of smartcards by Christopher Tarnovsky |
|
|
Keynote: Sophisticated million dollar hack to discover weaknesses in a series of smartcards affecting millions by Christopher Tarnovsky |
|
|
Bits from the matrix: optical ROM extraction by Chris Gerlinsky |
|
|
OverTime: Remote Timinig Attacks against IoT devices by Cristofaro Mune |
|
|
Workshop: Post-quantum cryptography by Michael Hamburg |
|
|
Speculative execution vulnerabilities: From a Simple Oversight to a Technological Nightmare by Raoul Strackx |
|
|
Workshop: Using Symbolic Execution for IoT Bug Hunting by Grzegorz Wypych |
|
|
Integrated Circuit Offensive Security by Olivier Thomas |
|
|
Cloning a Sound Card by Eric Schlaepfer |
|
|
Top 10 secure boot mistakes by Jasper van Woudenberg |
|
|
Workshop: Hacking USB on the Cheap by Kate Temkin & Mikaela Szekely |
|
|
Bluetooth Hacking: Tools and Techniques by Mike Ryan |
|
|
Low-Cost IC Emission Reverse Engineering by John McMaster |
|
|
Nationally Critical Infrastructure needs Secure Hardware—aka Democracy a Critical System by Dr. Joseph Kiniry |
|
|
CXO Panel: Hardware Security By Design |
|
|
CXO Panel: Unique Challenges Of Security Programs For Hardware/IoT Makers |
|
|