Keynote:- State-of-the-Art Anti-Counterfeiting: Attacks and Countermeasures by Scott Best |
|
|
Panel:- A New Root of Trust: Changing Computing with TEE |
|
|
Panel:- The Right to Secure - What, Who, How and Why! |
|
|
BarraCUDA: GPUs do Leak DNN Weights by Peter Horvath |
|
|
Building a Silicon Analysis Toolkit by Hash Salehi |
|
|
Exploring Dual Edges of SRAM Data Remanence in SoCs: Covert Storage and Exfiltration Risks in TEE by Jubayer Mahmod |
|
|
Integrating AI with Retro Hardware: A Commodore 64 LLM Module by Konrad Jędrzejczyk & Marek Zmysłowski |
|
|
LeapFrog: The Rowhammer Instruction Skip Attack by Andrew Adiletta, Caner Tol & Berk Sunar |
|
|
My car, My keys: obtaining CAN bus SecOC signing keys by Willem Melching & Greg Hogan |
|
|
One SMS to root them all: exposing critical threats in millions of connected devices by Alexander Kozlov & Sergey Anufrienko |
|
|
Secrets of Simos18: Reverse Engineering the secure boot mechanism of an Engine Control Unit by Brian Ledbetter |
|
|
Teaching New Tricks to an Old Micro: Breaking into Chips By Reading the Datasheet by Mark Omo & James Rowley |
|
|
TPM 2.0 Attestable Firmware: Recovering Trust after Firmware Flaws by Chris Fenner and Jeff Andersen |
|
|
TPMs and the Linux Kernel: unlocking a better path to hardware security by Ignat Korchagin |
|
|
Who Monitors the Monitors? Hacking the Monitor Control Command Set by Eugene Lim |
|
|