Schedule for Hardware Security Conference & Training, Netherlands 2019
Dates | Timings | Training Name | Training Room | |
---|---|---|---|---|
23rd - 25th Sep | 08:15 to 09:00 | Registration | ||
Start | 09:00 | Embedded Physical Attacks 101 by Lejla Batina, Kostas Papagiannopoulos & Leo Weissbart | Amsterdam 2 | |
Morning Coffee Break | 10:45 to 11:15 | Practical Car Hacking by Guillaume Heilles | Amsterdam 3 | |
Lunch Break | 13:00 to 14:00 | TEE Offensive Core by Cristofaro Mune | Amsterdam 4 | |
Afternoon Coffee Break | 15:45 to 16:15 | IC Reverse Engineering & Code Dump by Olivier Thomas | Rotterdam 1 | |
End | 18:00 | Tiny Embedded Systems Firmware Reverse Engineering & Exploitation by Alexander Bolshev & Tao Sauvage | Rotterdam 2 |
Note: Training registration desk will open on 23rd & 24th September at 08:15 am. Please come in advance to collect your badge.
Dates | Timings | Training Name | Training Room | |
---|---|---|---|---|
24th - 25th Sep | 08:15 to 09:00 | Registration | ||
Start | 09:00 | Low-Level Hardware Reversing by Javier Vazquez Vidal & Henrik Ferdinand Nolscher | Amsterdam 1 | |
Morning Coffee Break | 10:45 to 11:15 | |||
Lunch Break | 13:00 to 14:00 | |||
Afternoon Coffee Break | 15:45 to 16:15 | Machine Learning and SCA: Advanced Tutorial by Stjepan Picek | WTC Barcelona | |
End | 18:00 |
Note: Training registration desk will open on 23rd & 24th September at 08:15 am. Please come in advance to collect your badge.
Start | End | Talks (Amsterdam 2-4) |
Workshops (Amsterdam 1) |
CTFs & Villages (Holland Hall) |
---|---|---|---|---|
08:00 | 09:00 | Registration | ||
09:00 | 09:15 | Opening Note | ||
09:15 | 10:00 | Keynote:- Integrated-Circuit Surgery: getting to the heart of the problem with the smallest scalpel by John Walker | ||
10:00 | 11:00 | RIDLed with CPU bugs by Alyssa Milburn & Stephan van Schaik |
|
|
11:00 | 11:15 | Coffee Break | ||
11:15 | 12:15 | Exposing device features on 4G & 5G networks by Altaf Shaik & Ravishankar Borgaonkar | Workshop:- Enter FACT: Boost your firmware security analysis with automation, visualization, and cross referencing by Johannes vom Dorp & Peter Weidenbach | |
12:15 | 13:00 | It's easier to break than to patch: a stealthy DoS attack against CAN by Stefano Zanero & Stefano Longari | ||
13:00 | 14:00 | Lunch Break | ||
14:00 | 14:45 | Hacking pre-obd car for fun and horsepower by Gyver Ferrand | Workshop:- Scaffold board showcase by Olivier Heriveaux & Karim Abdellatif | |
14:45 | 15:30 | Hardware security evaluation of Intel MAX 10 FPGAs: from feasibility study to security boundaries by Sergei Skorobogatov | ||
15:30 | 16:00 | Coffee Break | ||
16:00 | 16:45 | Enclosure PUF: Tamper Proofing Commodity Hardware & other Applications by Christian Zenger & Lars Steinschulte | ||
16:45 | 17:30 | CXO PANEL:- Supply Chain Security - Mission Impossible? | ||
17:30 | 18:00 | Social Networking | ||
19:30 | 21:30 | Invite Only Cocktail Dinner |
Note: Those registered with Student Conference Pass are requested to carry their valid Student ID.
Start | End | Talks (Amsterdam 2-4) |
Workshops (Amsterdam 1) |
CTFs & Villages (Holland Hall) |
---|---|---|---|---|
10:00 | 11:00 | Keynote:- Roots of Trust and Attestation by Trammell Hudson | ||
11:00 | 11:15 | Coffee Break | ||
11:15 | 12:15 | Poking the S in SD cards by Nicolas Oberli | Workshop:- How to Build & Secure a RISC-V Embedded System by Cesare Garlati & Prof. Sandro Pinto |
|
12:15 | 13:00 | Day-1 with a TTIG-868 by Brian Butterly | ||
13:00 | 14:00 | Lunch Break | ||
14:00 | 14:45 | Sniffle: A low cost sniffer for Bluetooth 5 by Sultan Qasim Khan | ||
14:45 | 15:30 | When hardware attacks scale by Marc Witteman | ||
15:30 | 16:00 | Coffee Break | ||
16:00 | 16:45 | Electric vehicle CAN man-in-the-middling by Emile Nijssenv | ||
16:45 | 17:30 | CXO PANEL:- Security Certifications for IoT Devices | ||
17:30 | 17:45 | CTF winners and announcements | ||
17:45 | 18:15 | Social Networking |