image image

Speakers




Keynote

Herbert Bos

Herbert Bos

Professor at Vrije Universiteit
When Threat Models Meet

Speakers

Vladimir Kononovich

Vladimir Kononovich

Positive Technologies
Blackboxing Diebold-Nixdorf ATMs



Enrico Barberis & Hany Ragab

Enrico Barberis & Hany Ragab

VUSec – Vrije Universiteit Amsterdam
Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks
Dr. Victor Lomné

Dr. Victor Lomné

NinjaLab
A Side Journey to Titan - Revealing and Breaking NXP’s P5x ECDSA Implementation on the Way



Jiska Classen, Fabian Freyer and Stacksmashing

Jiska Classen, Fabian Freyer and Stacksmashing


Over the Air-Tag: shenanigans with the most over-engineered keyfinder
Douglas McKee &  Philippe Laulheret

Douglas McKee & Philippe Laulheret

McAfee Enterprise
Overmedicated: Breaking the security barrier of a B.Braun Infusion pump
Philippe Teuwen & Christian Herrmann

Philippe Teuwen & Christian Herrmann

Quarkslab | IceSQL
EEPROM: It Will All End in Tears



Sergei Skorobogatov

Sergei Skorobogatov

University of Cambridge
Teardown and feasibility study of IronKey - the most secure USB Flash drive
asper van Woudenberg

Jasper van Woudenberg

Riscure Inc
Flippin' fake flops for fun, fame and fortune

Tristan Claverie & Jose Lopes Esteves

Tristan Claverie & Jose Lopes Esteves

ANSSI
BlueMirror: Defeating Authentication in Bluetooth protocols
Assaf Carlsbad & Itai Liba

Assaf Carlsbad & Itai Liba

SentinelOne
Automated vulnerability hunting in SMM using Brick
Rafael Boix Carpi & Federico Menarini

Rafael Boix Carpi & Federico Menarini

Riscure
Divide & Conquer revisited: FI as a SW EXP primitive

Village & Workshop

Johannes vom Dorp & Christopher Krah

Johannes vom Dorp & Christopher Krah

Fraunhofer FKIE
Firmware Security Village
Alexandre Triffault

Alexandre Triffault

AT Security / Lab401
Physical Intrusion Workshop



Santos Merino del Pozo and Alberto Battistello

Santos Merino del Pozo and Alberto Battistello

TII & Security Pattern
Side-Channel Analysis - a learn-by-example approach

Panel

David Calligaris

David Calligaris

Huawei
Supply Chain Security (and attacks)
Cristofaro Mune

Cristofaro Mune

Raelize
Supply Chain Security (and attacks)
Santos Merino

Santos Merino

TII
Supply Chain Security (and attacks)

Jan Geertsma

Jan Geertsma

Signify
Supply Chain Security (and attacks)
Trammell Hudson

Trammell Hudson

Lower Layer Labs
How do we build trustable open source hardware?