Keynote:- The microarchitectures that I saw and the ones that I hope to one day see by Rodrigo Branco |
 |
 |
Keynote:- Securing the Unseen: Vulnerability Research in Confidential Computing by Josh Eads & Cfir Cohen |
 |
 |
Cryo-Mechanical RAM Content Extraction: A DIY Cold Boot Robot for A Thousand Bucks by Dr. Ang Cui |
 |
|
“Un-fare Advantage” - Hacking the MBTA CharlieCard from 2008 to Present by Bobby Rauch |
 |
 |
Affordable EMFI attacks against modern IoT chips by Davide Toldo |
 |
 |
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations by Endres Puschner & Steffen Becker |
 |
 |
Back to the future with platform security by Enrique Nissim, Joseph Tartaro & Krzysztof Okupski |
 |
|
BreakMi: Reversing, Exploiting and Fixing Xiaomi (and Fitbit) Fitness Tracking EcosystemsMarco Casagrande & Daniele Antonioli |
 |
 |
OneKey is all it takes: The Misuse of Secure Components in Hardware Wallets by Michael Mouchous & Karim Abdellatif |
 |
 |
Building a Modern Bluetooth Sniffer by Mike Ryan |
 |
|
How to Hack Shannon Baseband (from a Phone) by Natalie Silvanovich |
 |
 |
Next-Gen Exploitation: Exploring the PS5 Security Landscape by Specter |
 |
 |
Inside Apple's Lightning: JTAGging the iPhone for fuzzing and profit by Thomas Roth |
 |
|
Evolution of a Side Channel - Benchmarking the Static Power Vulnerability of Four CMOS Generations by Thorben Moos |
 |
 |
Exploring chip decaping techniques for silicon die inspection and reverse engineering by Antoine Bercovici & John McMaster |
 |
|
Hands-on IoT firmware extraction and forensics by Dennis Giese |
|
|
Analyzing Decompiled C++ Vtables and Objects in GCC Binaries by James Rowley |
|
 |
Data Leakage: A Multi-Source Threat by Ed and Paul |
|
|
Hardware Security for Cloud Storage Providers by Stefano Righi, Alex Matrosov & Cristofaro Mune |
 |
|