Hardwear.io Netherlands 2022 Links
Date | Timing | Training Name | Training Room | |
---|---|---|---|---|
24-26 Oct 2022 | 8:15 to 9:00 | Registration | ||
Start | 9:00 | Practical Car Hacking | Van Gogh | |
Unlocking the secrets within ROMs | Picasso | |||
Coffee Break | 11:00 to 11:15 | Reverse Engineering Firmware with Ghidra | Vermeer | |
Practical Hardware Hacking Basics + Bonus Day! | Gauguin | |||
Lunch Break | 13:00 to 14:00 | TEEPwn: Breaking Trusted Execution Environments | Rembrandt | |
Attacking real-world crypto in embedded systems with side-channel & fault analysis | Mondriaan | |||
Coffee Break | 15:45 to 16:00 | SDR Hacking Essential: Break into most RF communications | Dali | |
Reverse-Engineering, Emulation, and Dynamic Testing of Cellular Baseband Firmware | Monet | |||
Embedded C/C++ Implementation Vulnerabilities | Potter | |||
End | 17:30 | x86-64 Intel Firmware Attack & Defense | ||
Xeno's All You Can Learn Buffet | ||||
08:00 | 09:20 | Registration | ||
09:20 | 09:30 | Opening Note | ||
09:30 | 10:15 | [KEYNOTE] Reverse Engineering is Good for Soul by Travis Goodspeed | ||
10:15 | 11:00 | Popping Locks, Stealing Cars, and Breaking a Billion Other Things: Bluetooth LE Link Layer Relay Attacks by Sultan Qasim Khan | ||
11:00 | 11:15 | Coffee Break | ||
11:15 | 12:00 | Using EMC testing equipment as a new side channel acquisition technique by Nicolas Oberli & Benjamin Vernoux | ||
12:00 | 12:45 | How To Tame Your Robot by Jiska Classen & Fabian Freyer | ||
12:45 | 14:00 | Lunch Break | ||
14:00 | 14:45 | Rethinking Trusted Execution Environments in the Age of Reconfigurable Computing by Sérgio Pereira & Dr. Sandro Pinto | ||
14:45 | 15:30 | Assessing the security of an SMM supervisor by Ilja van Sprundel | ||
15:30 | 15:45 | Coffee Break | ||
15:45 | 16:30 | Using a magic wand to break the iPhone's last security barrier by Tihmstar | ||
16:30 | 17:15 | [Panel] How can we make hardware bug bounties better? | ||
17:15 | 18:00 | Social Networking | ||
19:30 | 21:30 | Invite Only Dinner & Drinks | ||
09:30 | 10:15 | Practical Invasive Attacks, How the Hardware is Hacked for Compatible Product Creation? by Thomas Olivier | ||
10:15 | 11:00 | Hardware attacks against SM4 in practice by Sylvain Pelissier & Nicolas Oberli | ||
11:00 | 11:15 | Coffee Break | ||
11:15 | 12:00 | Bypass NXP LPC-Family debug check with Voltage Fault Injection by Waleed AlZamil & Bandar Alharbi | ||
12:00 | 12:45 | Blackbox fuzzing with side channels by Sergei Volokitin | ||
12:45 | 14:00 | Lunch Break | ||
14:00 | 14:45 | HandPwning: security pitfalls of hand-geometry recognition-based access control systems by Luca Bongiorni | ||
14:45 | 15:30 | An Overview of the Security of Some Hardware FIDO(2) Tokens by Victor Lomne | ||
15:30 | 15:45 | Coffee Break | ||
15:45 | 16:30 | TBA | ||
16:30 | 17:15 | Closing Ceremony & Prize | ||
17:15 | 18:00 | Networking with Beers & Samosa |
* Central European Summer Time (CEST)