Keynote:- Adventures of Wallet Hacking by Joe Grand |
|
|
Keynote:- Fireside Chat with Window Snyder |
|
|
Andy Nguyen |
|
|
Breaking SoC Security by Glitching OTP Data Transfers by Cristofaro Mune |
|
|
Obfuscation Revealed: Leveraging Electromagnetic Emanations for IoT Malware Classification by Damien Marion, Duy-Phuc Pham & Annelie Heuser |
|
|
Physical Side channel attacks on PCs by Daniel Genkin & Roei Schuster |
|
|
Optimization and Amplification of Cache Side Channel Signals by David Kaplan |
|
|
Armed to Boot: A Novel Enhancement to Arm's Secure Boot Chain by Derek & Ryan Chow |
|
|
Exploiting AMBA AXI protocol for Denial-of-Service attacks of shared resources by Francesco Restuccia |
|
|
Breaking a Recent SoC’s Hardware AES Accelerator Using Body Biasing Injection by Karim M. Abdellatif |
|
|
Unwanted features: Finding and exploiting an in ROM buffer overflow on the LPC55S69 by Laura Abbott |
|
|
Supply Chain Level 0: Grinding Tractors to a Halt - Growing Pains in Agricultural Hardware Security by Sick Codes |
|
|
Self-labeling electronic shelf labels by Steffen Robertz |
|
|
Perimeter Breached! Hacking an Access Control System by Steve Povolny & Sam Quinn |
|
|
Nest Doorbell and Charge 5 Device Architecture Overview by Jay Cox & Nic Watson |
|
|
Hands on PAL RE: microprobing and more by John McMaster |
|
|
Lockpick Session by Marcus Richerson |
|
|