Keynote:- State-of-the-Art Anti-Counterfeiting: Attacks and Countermeasures by Scott Best |
 |
 |
Panel:- A New Root of Trust: Changing Computing with TEE |
 |
|
Panel:- The Right to Secure - What, Who, How and Why! |
 |
|
BarraCUDA: GPUs do Leak DNN Weights by Peter Horvath |
 |
 |
Building a Silicon Analysis Toolkit by Hash Salehi |
 |
|
Exploring Dual Edges of SRAM Data Remanence in SoCs: Covert Storage and Exfiltration Risks in TEE by Jubayer Mahmod |
 |
 |
Integrating AI with Retro Hardware: A Commodore 64 LLM Module by Konrad Jędrzejczyk & Marek Zmysłowski |
 |
 |
LeapFrog: The Rowhammer Instruction Skip Attack by Andrew Adiletta, Caner Tol & Berk Sunar |
 |
|
My car, My keys: obtaining CAN bus SecOC signing keys by Willem Melching & Greg Hogan |
 |
 |
One SMS to root them all: exposing critical threats in millions of connected devices by Alexander Kozlov & Sergey Anufrienko |
 |
 |
Secrets of Simos18: Reverse Engineering the secure boot mechanism of an Engine Control Unit by Brian Ledbetter |
 |
 |
Teaching New Tricks to an Old Micro: Breaking into Chips By Reading the Datasheet by Mark Omo & James Rowley |
 |
 |
TPM 2.0 Attestable Firmware: Recovering Trust after Firmware Flaws by Chris Fenner and Jeff Andersen |
 |
|
TPMs and the Linux Kernel: unlocking a better path to hardware security by Ignat Korchagin |
 |
 |
Who Monitors the Monitors? Hacking the Monitor Control Command Set by Eugene Lim |
 |
|