Keynote:- State-of-the-Art Anti-Counterfeiting: Attacks and Countermeasures by Scott Best |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Who Monitors the Monitors? Hacking the Monitor Control Command Set by Eugene Lim |
|
|
My car, My keys: obtaining CAN bus SecOC signing keys by Willem Melching & Greg Hogan |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Integrating AI with Retro Hardware: A Commodore 64 LLM Module by Konrad Jędrzejczyk & Marek Zmysłowski |
![video button](https://hardwear.io/images/video-btn.png) |
![download button](/images/download-symbol.png) |
Secrets of Simos18: Reverse Engineering the secure boot mechanism of an Engine Control Unit by Brian Ledbetter |
|
![download button](/images/download-symbol.png) |
Teaching New Tricks to an Old Micro: Breaking into Chips By Reading the Datasheet by Mark Omo & James Rowley |
|
![download button](/images/download-symbol.png) |
LeapFrog: The Rowhammer Instruction Skip Attack by Andrew Adiletta, Caner Tol & Berk Sunar |
|
|
TPMs and the Linux Kernel: unlocking a better path to hardware security byIgnat Korchagin |
|
![download button](/images/download-symbol.png) |
BarraCUDA: GPUs do Leak DNN Weights by Peter Horvath |
|
![download button](/images/download-symbol.png) |
One SMS to root them all: exposing critical threats in millions of connected devices by Alexander Kozlov & Sergey Anufrienko |
|
![download button](/images/download-symbol.png) |
Building a Silicon Analysis Toolkit by Hash Salehi |
|
|
Exploring Dual Edges of SRAM Data Remanence in SoCs: Covert Storage and Exfiltration Risks in TEE by Jubayer Mahmod |
|
![download button](/images/download-symbol.png) |
Hands-on IoT firmware extraction and forensics of eMMC flash by Dennis Giese, & Braelynn |
|
|
Handson Decapping & Wire bonding Chips by Ken, Alex, John, & Antoine |
|
|