May 12 2022 | Topic: Deep Learning-based Side-channel Analysis: Challenges and Perspectives by Stjepan Picek |
|
Apr 28 2022 | Topic: PP0117 Secure Sub-System in System-on-Chip (3S IN SOC) Protection Profile Overview by Mr. Nir Tasher & Mrs. Rachel Menda-Shabat |
|
Apr 26 2022 | Topic: Can you park a car in a classroom? by Philippe Azalbert |
|
Apr 21 2022 | Topic: The AMD Branch (Mis)predictor: New Types and Methods of Straight-Line Speculation (SLS) Vulnerabilities by Pawel Wieczorkiewicz |
|
Apr 14 2022 | Topic: Disarming TrustZone with TEE Privilege Reduction by David Cerdeira & Sandro Pinto |
|
Mar 28 2022 | Topic: Applying Zero Trust Principles to building a Secure RISC-V System by Suresh Sugumar |
|
Mar 24 2022 | Topic: Apple vs EMA: Electromagnetic Side Channel Attacks on Apple CoreCrypto by Gregor Haas |
|
Feb 14 2022 | Topic: Cyber-physical system security: Exploiting the physics of sensors to undermine AI-based decisions by Dr. Sara Rampazzi |
|
Feb 07 2022 | Topic: MoonBounce: Internals of the 3rd publicly known UEFI firmware implant by Mark Lechtik |
|
Jan 17 2022 | Topic: Knockin' on MediaTek aDSP’s Door by Slava Makkaveev |
|
Jan 11 2022 | Topic: CPU Fuzzing for Discovering Hardware-caused Information Leakage by Michael Schwarz |
|
Nov 29 2021 | Topic: How to perform electromagnetic side-channel analysis by simulation by Philippe Maurine, Thomas Ordas, Davide Poggi, Alexandre Sarafianos |
|
Sep 30 2021 | Topic: Breaking chips with undetectable hardware trojans by Matt Venn |
|
Sep 13 2021 | Topic: Securing Your Microcontroller with Arm TrustZone Technology by Oren Hollander |
|
Sep 07 2021 | Topic: PCIe device security - The evolution of DMA attacks by Maggie Jauregui & Cuauhtemoc Chavez Corona |
|
Jul 20 2021 | Topic: SpecFuzz: Bringing Spectre-type vulnerabilities to the surface by Oleksii Oleksenko |
|
Jul 01 2021 | Topic: What Makes a Proactive Hardware Security Program Successful? by Jason Oberg & Panelists:Helena Handschuh & Charles Guillemet |
|
Jul 01 2021 | Topic: Trust but Verify: Hardware Assurance in a Globalized Supply Chain through Reverse Engineering by Domenic Forte |
|
Jun 22 2021 | Topic: Hardware Trojans vs. Logic Locking: Challenges and Opportunities by Dominik Šišejković |
|
Jun 15 2021 | Topic: Embedded kernel emulation in QEMU for security assessment by Stephane Duverger |
|
Jun 08 2021 | Topic: Security Requirements for Connected MCUs and MPUs – Modeling of a SESIP Profile by Eve Atallah |
|
May 31 2021 | Topic: Hardware Security Primitives (PUFs and TRNGs) exploiting Randomness in Emerging Memory Devices by Giorgio Di Natale |
|
May 21 2021 | Topic: Artificial Intelligence for Fault Injection Parameter Selection by Marina Krček |
|
May 11 2021 | Topic: Optical Side-Channel Attacks through the Chip Backside: Threats, Challenges, and Opportunities by Dr. Shahin Tajik |
|
May 04 2021 | Topic: Doing More with Less: Hardware Security Primitives reusing Existing Circuits for Secure System on Chips by Sachin Taneja |
|
Apr 20 2021 | Topic: Hunting for the keys of the SAMA5 castle by Dmitry Janushkevich |
|
Apr 12 2021 | Topic: Threat Modeling Medical Devices - when our lives depend on it ... by Sebastien Deleersnyder |
|
Mar 29 2021 | Topic: TPM Attacks: Decoding, Understanding and Manipulating the LPC Protocol by Douglas Gastonguay-Goddard & Sue Mohieldin |
|
Mar 16 2021 | Topic: Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions by Urbi Chatterjee |
|
Mar 09 2021 | Topic: Stealing secrets from Intel vaults, with side channels and voltage faults by David Oswald and Zitai Chen |
|
Mar 02 2021 | Topic: Practical Hardware Attacks on Deep Learning by Sanghyun Hong |
|
Feb 26 2021 | Topic: Automotive product security (or the same old story but on wheels) by Rafael Boix Carpi |
|
Feb 22 2021 | Topic: Security Property-driven Fault Injection Assessment in Modern SoCs by Farimah Farahmandi |
|
Jan 29 2021 | Topic: The Practical Design & Implementation of Zero-Trust Supply Chains for Electronic Products by Phil Vachon & Joel Even |
|
Jan 25 2021 | Topic: A Look Into (Few) Side-channel and Fault attack vulnerabilities in lattice based PQC schemes and Countermeasures by Shivam Bhasin |
|
Nov 17 2020 | Topic: Hardware Acceleration on Reconfigurable Platform for Efficient Cryptography Design by Elif Bilge Kavun |
|
Oct 20 2020 | Topic: Securing keys in leading-edge chips with Physical Unclonable Functions by Geert-Jan Schrijen |
|
Oct 13 2020 | Topic: Bringing light into the Black -Box // Step by step black-box reverse engineering of ECUs by Nils Weiss and Enrico Pozzobon |
|
Oct 06 2020 | Topic: Reverse Engineering UDS and firmware on the Tesla Model S Battery Management System by Patrick Kiley |
|
Sep 18 2020 | Topic: Look mum, no key! Bypassing Encrypted Secure Boot by Cristofaro Mune & Niek Timmers |
|
Sep 14 2020 | Topic: Side-channel analysis on SoC devices: a Graal's quest by Hugues Thiebeauld |
|
Sep 11 2020 | Topic: RISC-V: How an open ISA benefits hardware security by Drew Fustini |
|
Sep 03 2020 | Topic: Beyond Root: Custom Firmware for Embedded Mobile Chipsets by Christopher Wade |
|
Aug 27 2020 | Topic: Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares by Veronica Kovah |
|
Aug 24 2020 | Topic: Sinking U-Boots with Depthcharge: Effective Exploitation of Boot-Time Security Debt by Jon Szymaniak |
|
Aug 19 2020 | Topic: How efiXplorer helping to solve challenges in reverse engineering of UEFI firmware by Alex Matrosov |
|
Aug 13 2020 | Topic: Securing CAN bus: augmenting the CAN protocol by Dr. Ken Tindell |
|
Aug 10 2020 | Topic: Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation by Robert Buhren |
|
Aug 04 2020 | Topic: Building a Repairable Future by Kyle Wiens |
|
Jul 16 2020 | Topic: Building Whiteboxes: attacks and defenses by Matthieu Daumas |
|
Jul 06 2020 | Topic: Why Fault Injection is the attacker's weapon of choice in the IoT era by Marc Witteman |
|
Jul 02 2020 | Topic: Deep Learning-based Denoising of TEMPEST Images for Efficient Optical Character Recognition by Santiago Morales & Juan Galvis |
|
Jun 16 2020 | Topic: The current landscape of global IoT security regulations by Brad Ree |
|
Jun 11 2020 | Topic: Analyzing Embedded Systems The Smart Way by Henrik Ferdinand Nolscher |
|
Jun 04 2020 | Topic: Reverse engineering raw firmware: a tool to get you started by Guillaume Heilles |
|
May 28 2020 | Topic: A decade of Machine Learning in Profiled Side-channel Analysis by Stjepan Picek |
|
May 21 2020 | Topic: RF shadow games by Sébastien Dudek |
|