Toggle navigation
Home
USA 2025
Register
CFP
Webinars
Past Events
Media Center
About
Code Of Conduct
Privacy Policy
Review Board
Testimonials
Media Kit
Contact Us
Hardwear.io Netherlands 2024 Links
Home
|
Register
|
Trainings
|
Speakers
|
Schedule
|
CFP
|
CTF
|
HardPwn
|
Sponsors & Partners
Schedule
Training (3 days)
Conference Day One - 24 Oct 2024
Conference Day Two - 25 Oct 2024
MemSec Talks
Date
Timing
Training Name
Hotel
Training Room
21st Oct - 23rd Oct Nov
(3 Days)
8:15 to 9:00
Registration
Start
9:00
SDR Hacking advanced: Reversing and exploiting wireless communications
Marriott Amsterdam
Salon A
TAoFI: Advanced Fault Injection Techniques & Attacks
Marriott Amsterdam
Salon B
Morning
Coffee Break
11:00 to 11:15
Practical Hardware Hacking Basics + Bonus Day!
Marriott Amsterdam
Salon C
Practical Car Hacking
Marriott Amsterdam
Salon D
Lunch Break
13:00 to 14:00
Applied Fault Injection 2.0
Marriott Amsterdam
Salon E
FPGA Reverse Engineering
Marriott Amsterdam
Studio 5
(AI-assisted) side-channel attacks on real-world crypto implementations
Marriott Amsterdam
Studio 6
Afternoon
Coffee Break
15:45 to 16:00
eSIM/eUICC Security for Security Experts
Marriott Amsterdam
Studio 7
Unlocking the secrets within ROMs
Marriott Amsterdam
Studio 3
End
17:30
Mastering UEFI Secure Boot and Intel Root of Trust Technologies
Park Central
Emma
Telco networks for pentesters: 2G, 3G, 4G and 5G
Park Central
Amalia
START
END
Talks (Salon A+B+C)
Workshop (Salon 5)
08:15
09:20
Registration
09:20
09:30
Opening Note
09:30
10:10
[KEYNOTE]
Side Channel Attacks: Lessons Learned or Troubles Ahead? by
Daniel Genkin
10:15
10:55
EUCLEAK by
Thomas Roche
10:55
11:15
Coffee Break
11:20
12:00
EL3XIR: Fuzzing COTS Secure Monitors by
Marcel Busch & Christian Lindenmeier
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
11:20
12:45
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
12:05
12:45
Hacking EV charging stations via the charging cable by
Wilco van Beijnum & Sebastiaan Laro Tol
12:45
14:00
Lunch Break
14:00
14:40
HAWKEYE – Recovering Symmetric Cryptography From Hardware Circuits by
Julian Speith
[WORKSHOP]
One for all and all for WHAD: wireless shenanigans made easy! by
Damien Cauquil & Romain Cayre
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
14:00
16:10
[WORKSHOP]
One for all and all for WHAD: wireless shenanigans made easy! by
Damien Cauquil & Romain Cayre
14:00
16:10
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
14:45
15:25
Is Your Memory Protected? Uncovering Hidden Vulnerabilities in Automotive MPU Mechanisms by
Nimrod Stoler
15:30
16:10
Byepervisor: How We Broke the PS5 Hypervisor by
SpecterDev
16:10
16:25
Coffee Break
16:25
17:05
MIFARE Classic: exposing the static encrypted nonce variant by
Philippe Teuwen
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
16:25
17:05
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
19:00
21:30
Invite Only Dinner & Drinks
START
END
Talks (Salon A+B+C)
Workshop (Salon 5)
09:30
10:10
[KEYNOTE]
Cyber investigations: reading between the lines of Law enforcement press releases by
Donatas Mazeika
10:15
10:55
Escaping the sandbox: Side Channel Shenanigans on Our DIY Chip by
Jasper van Woudenberg
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
10:15
10:55
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
10:55
11:15
Coffee Break
11:20
12:00
Fuzzing GPRS Layer-2 for Fun and Profit by
Dyon Goos & Marius Muench
[WORKSHOP]
Getting Started with Automotive Ethernet Security Testing by
Enrico Pozzobon
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
14:00
16:10
[WORKSHOP]
Getting Started with Automotive Ethernet Security Testing
11:20
12:45
Firmware Security Village
The Donjon Hardware Attack Tool Suite - Fault Injection
12:05
12:45
ARM MTE: The End of Memory Corruption? Not Yet by
Juhee Kim
12:45
14:00
Lunch Break
14:00
14:40
Bluetooth Low Energy GATT Fuzzing: from specification to implementation by
Baptiste Boyer
14:00
16:10
14:45
15:25
Google Nest Wifi Pro Bypassing Android Verified Boot by
Sergei Volokitin
15:30
16:10
[Panel]
Securing the Global Supply Chain: integrity of Hardware, Software and Supply Chain Management
16:10
16:25
Coffee Break
16:25
17:00
Hardpwn & CTF Prize Ceremoany Closing Notes
Date
Time
Title
Start
End
Room (Studio 7)
25th Oct 2024
Room (Studio 7)
25th Oct 2024
10:45
11:30
Future of Computer Architecture and Hardware Security by
Onur Mutlu
10:45
11:30
Future of Computer Architecture and Hardware Security by
Onur Mutlu
11:30
12:00
From Rowhammer to GhostWrite: Advanced Exploitation and Discovery of Hardware Bugs by
Fabian Thomas & Lukas Gerlach
12:00
12:30
Memory Security Retrospective by
David Hulton
12:30
13:00
Hacking NAND Memory Pinout using Logic Analyzer by
Sasha Sheremetov
Lunch
14:00
14:30
Sticky Tags Stop Spatial Memory Errors by
Herbert Bos
14:30
15:00
Imaging and Reverse Engineering Sense Amplifiers in Modern DRAM by
Michele Marazzi
15:00
15:30
Looking Back at 10 Years of Rowhammer Exploits by
Jonas Juffinger & Andreas Kogler
15:30
16:00
DramaQueen: Revisiting Side Channels in DRAM by
Ben Gras
16:00
16:30
SILVER BULLET: solving Row Hammer entirely by
Fabrice Devaux
* Central European Summer Time (CEST)
DON’T FALL BEHIND. Stay current with all things Hardwear.io!