Keynote:- The microarchitectures that I saw and the ones that I hope to one day see by Rodrigo Branco |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Keynote:- Securing the Unseen: Vulnerability Research in Confidential Computing by Josh Eads & Cfir Cohen |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Cryo-Mechanical RAM Content Extraction: A DIY Cold Boot Robot for A Thousand Bucks by Dr. Ang Cui |
![video button](https://hardwear.io/images/video-btn.png) |
|
“Un-fare Advantage” - Hacking the MBTA CharlieCard from 2008 to Present by Bobby Rauch |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Affordable EMFI attacks against modern IoT chips by Davide Toldo |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations by Endres Puschner & Steffen Becker |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Back to the future with platform security by Enrique Nissim, Joseph Tartaro & Krzysztof Okupski |
![video button](https://hardwear.io/images/video-btn.png) |
|
BreakMi: Reversing, Exploiting and Fixing Xiaomi (and Fitbit) Fitness Tracking EcosystemsMarco Casagrande & Daniele Antonioli |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
OneKey is all it takes: The Misuse of Secure Components in Hardware Wallets by Michael Mouchous & Karim Abdellatif |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Building a Modern Bluetooth Sniffer by Mike Ryan |
![video button](https://hardwear.io/images/video-btn.png) |
|
How to Hack Shannon Baseband (from a Phone) by Natalie Silvanovich |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Next-Gen Exploitation: Exploring the PS5 Security Landscape by Specter |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Inside Apple's Lightning: JTAGging the iPhone for fuzzing and profit by Thomas Roth |
![video button](https://hardwear.io/images/video-btn.png) |
|
Evolution of a Side Channel - Benchmarking the Static Power Vulnerability of Four CMOS Generations by Thorben Moos |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Exploring chip decaping techniques for silicon die inspection and reverse engineering by Antoine Bercovici & John McMaster |
![video button](https://hardwear.io/images/video-btn.png) |
|
Hands-on IoT firmware extraction and forensics by Dennis Giese |
|
|
Analyzing Decompiled C++ Vtables and Objects in GCC Binaries by James Rowley |
|
![download button](/images/download-symbol.png) |
Data Leakage: A Multi-Source Threat by Ed and Paul |
|
|
Hardware Security for Cloud Storage Providers by Stefano Righi, Alex Matrosov & Cristofaro Mune |
![video button](https://hardwear.io/images/video-btn.png) |
|