Keynote:- The microarchitectures that I saw and the ones that I hope to one day see by Rodrigo Branco |
|
|
Keynote:- Securing the Unseen: Vulnerability Research in Confidential Computing by Josh Eads & Cfir Cohen |
|
|
Cryo-Mechanical RAM Content Extraction: A DIY Cold Boot Robot for A Thousand Bucks by Dr. Ang Cui |
|
|
“Un-fare Advantage” - Hacking the MBTA CharlieCard from 2008 to Present by Bobby Rauch |
|
|
Affordable EMFI attacks against modern IoT chips by Davide Toldo |
|
|
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations by Endres Puschner & Steffen Becker |
|
|
Back to the future with platform security by Enrique Nissim, Joseph Tartaro & Krzysztof Okupski |
|
|
BreakMi: Reversing, Exploiting and Fixing Xiaomi (and Fitbit) Fitness Tracking EcosystemsMarco Casagrande & Daniele Antonioli |
|
|
OneKey is all it takes: The Misuse of Secure Components in Hardware Wallets by Michael Mouchous & Karim Abdellatif |
|
|
Building a Modern Bluetooth Sniffer by Mike Ryan |
|
|
How to Hack Shannon Baseband (from a Phone) by Natalie Silvanovich |
|
|
Next-Gen Exploitation: Exploring the PS5 Security Landscape by Specter |
|
|
Inside Apple's Lightning: JTAGging the iPhone for fuzzing and profit by Thomas Roth |
|
|
Evolution of a Side Channel - Benchmarking the Static Power Vulnerability of Four CMOS Generations by Thorben Moos |
|
|
Exploring chip decaping techniques for silicon die inspection and reverse engineering by Antoine Bercovici & John McMaster |
|
|
Hands-on IoT firmware extraction and forensics by Dennis Giese |
|
|
Analyzing Decompiled C++ Vtables and Objects in GCC Binaries by James Rowley |
|
|
Data Leakage: A Multi-Source Threat by Ed and Paul |
|
|
Hardware Security for Cloud Storage Providers by Stefano Righi, Alex Matrosov & Cristofaro Mune |
|
|