Toggle navigation
Home
USA 2025
Register
Trainings
CFP
Webinars
Past Events
Media Center
About
Code Of Conduct
Privacy Policy
Review Board
Testimonials
Media Kit
Contact Us
Hardwear.io Netherlands 2024 Links
Home
|
Register
|
Trainings
|
Speakers
|
Schedule
|
CFP
|
CTF
|
HardPwn
|
Sponsors & Partners
Schedule
Training (3 days)
Conference Day One - 24 Oct 2024
Conference Day Two - 25 Oct 2024
MemSec Talks
Date
Timing
Training Name
Hotel
Training Room
21st Oct - 23rd Oct Nov
(3 Days)
8:15 to 9:00
Registration
Start
9:00
SDR Hacking advanced: Reversing and exploiting wireless communications
Marriott Amsterdam
Salon A
TAoFI: Advanced Fault Injection Techniques & Attacks
Marriott Amsterdam
Salon B
Morning
Coffee Break
11:00 to 11:15
Practical Hardware Hacking Basics + Bonus Day!
Marriott Amsterdam
Salon C
Practical Car Hacking
Marriott Amsterdam
Salon D
Lunch Break
13:00 to 14:00
Applied Fault Injection 2.0
Marriott Amsterdam
Salon E
FPGA Reverse Engineering
Marriott Amsterdam
Studio 5
(AI-assisted) side-channel attacks on real-world crypto implementations
Marriott Amsterdam
Studio 6
Afternoon
Coffee Break
15:45 to 16:00
eSIM/eUICC Security for Security Experts
Marriott Amsterdam
Studio 7
Unlocking the secrets within ROMs
Marriott Amsterdam
Studio 3
End
17:30
Mastering UEFI Secure Boot and Intel Root of Trust Technologies
Park Central
Emma
Telco networks for pentesters: 2G, 3G, 4G and 5G
Park Central
Amalia
START
END
Talks (Salon A+B+C)
Workshop (Salon 5)
08:15
09:20
Registration
09:20
09:30
Opening Note
09:30
10:10
[KEYNOTE]
Side Channel Attacks: Lessons Learned or Troubles Ahead? by
Daniel Genkin
10:15
10:55
EUCLEAK by
Thomas Roche
10:55
11:15
Coffee Break
11:20
12:00
EL3XIR: Fuzzing COTS Secure Monitors by
Marcel Busch & Christian Lindenmeier
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
11:20
12:45
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
12:05
12:45
Hacking EV charging stations via the charging cable by
Wilco van Beijnum & Sebastiaan Laro Tol
12:45
14:00
Lunch Break
14:00
14:40
HAWKEYE – Recovering Symmetric Cryptography From Hardware Circuits by
Julian Speith
[WORKSHOP]
One for all and all for WHAD: wireless shenanigans made easy! by
Damien Cauquil & Romain Cayre
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
14:00
16:10
[WORKSHOP]
One for all and all for WHAD: wireless shenanigans made easy! by
Damien Cauquil & Romain Cayre
14:00
16:10
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
14:45
15:25
Is Your Memory Protected? Uncovering Hidden Vulnerabilities in Automotive MPU Mechanisms by
Nimrod Stoler
15:30
16:10
Byepervisor: How We Broke the PS5 Hypervisor by
SpecterDev
16:10
16:25
Coffee Break
16:25
17:05
MIFARE Classic: exposing the static encrypted nonce variant by
Philippe Teuwen
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
16:25
17:05
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
19:00
21:30
Invite Only Dinner & Drinks
START
END
Talks (Salon A+B+C)
Workshop (Salon 5)
09:30
10:10
[KEYNOTE]
Cyber investigations: reading between the lines of Law enforcement press releases by
Donatas Mazeika
10:15
10:55
Escaping the sandbox: Side Channel Shenanigans on Our DIY Chip by
Jasper van Woudenberg
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
10:15
10:55
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
10:55
11:15
Coffee Break
11:20
12:00
Fuzzing GPRS Layer-2 for Fun and Profit by
Dyon Goos & Marius Muench
[WORKSHOP]
Getting Started with Automotive Ethernet Security Testing by
Enrico Pozzobon
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
14:00
16:10
[WORKSHOP]
Getting Started with Automotive Ethernet Security Testing
11:20
12:45
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
12:05
12:45
ARM MTE: The End of Memory Corruption? Not Yet by
Juhee Kim
12:45
14:00
Lunch Break
14:00
14:40
Bluetooth Low Energy GATT Fuzzing: from specification to implementation by
Baptiste Boyer
14:00
16:10
14:45
15:25
Google Nest Wifi Pro Bypassing Android Verified Boot by
Sergei Volokitin
15:30
16:10
[Panel]
Securing the Global Supply Chain: integrity of Hardware, Software and Supply Chain Management
16:10
16:25
Coffee Break
16:25
17:00
Hardpwn & CTF Prize Ceremoany Closing Notes
Date
Time
Title
Start
End
Room (Studio 7)
25th Oct 2024
Room (Studio 7)
25th Oct 2024
10:45
11:30
Future of Computer Architecture and Hardware Security by
Onur Mutlu
10:45
11:30
Future of Computer Architecture and Hardware Security by
Onur Mutlu
11:30
12:00
From Rowhammer to GhostWrite: Advanced Exploitation and Discovery of Hardware Bugs by
Fabian Thomas & Lukas Gerlach
12:00
12:30
Memory Security Retrospective by
David Hulton
12:30
13:00
Hacking NAND Memory Pinout using Logic Analyzer by
Sasha Sheremetov
Lunch
14:00
14:30
Sticky Tags Stop Spatial Memory Errors by
Herbert Bos
14:30
15:00
Imaging and Reverse Engineering Sense Amplifiers in Modern DRAM by
Michele Marazzi
15:00
15:30
Looking Back at 10 Years of Rowhammer Exploits by
Jonas Juffinger & Andreas Kogler
15:30
16:00
DramaQueen: Revisiting Side Channels in DRAM by
Ben Gras
16:00
16:30
SILVER BULLET: solving Row Hammer entirely by
Fabrice Devaux
* Central European Summer Time (CEST)
DON’T FALL BEHIND. Stay current with all things Hardwear.io!