Keynote:- Adventures of Wallet Hacking by Joe Grand |
 |
 |
Keynote:- Fireside Chat with Window Snyder |
|
|
Andy Nguyen |
 |
|
Breaking SoC Security by Glitching OTP Data Transfers by Cristofaro Mune |
 |
|
Obfuscation Revealed: Leveraging Electromagnetic Emanations for IoT Malware Classification by Damien Marion, Duy-Phuc Pham & Annelie Heuser |
 |
|
Physical Side channel attacks on PCs by Daniel Genkin & Roei Schuster |
 |
|
Optimization and Amplification of Cache Side Channel Signals by David Kaplan |
 |
 |
Armed to Boot: A Novel Enhancement to Arm's Secure Boot Chain by Derek & Ryan Chow |
 |
 |
Exploiting AMBA AXI protocol for Denial-of-Service attacks of shared resources by Francesco Restuccia |
 |
 |
Breaking a Recent SoC’s Hardware AES Accelerator Using Body Biasing Injection by Karim M. Abdellatif |
 |
 |
Unwanted features: Finding and exploiting an in ROM buffer overflow on the LPC55S69 by Laura Abbott |
 |
 |
Supply Chain Level 0: Grinding Tractors to a Halt - Growing Pains in Agricultural Hardware Security by Sick Codes |
 |
|
Self-labeling electronic shelf labels by Steffen Robertz |
 |
 |
Perimeter Breached! Hacking an Access Control System by Steve Povolny & Sam Quinn |
 |
 |
Nest Doorbell and Charge 5 Device Architecture Overview by Jay Cox & Nic Watson |
|
|
Hands on PAL RE: microprobing and more by John McMaster |
|
|
Lockpick Session by Marcus Richerson |
|
|