Challenging real-world targets: from iPhone to insulin pump
Hardware Trojans and the Internet of Things
Hack your body, one implant at a time
Reverse Engineering of Programmable Logic Bitstreams
To Guess Wrong is Expensive: A Deduce & Remove Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls
KERNELFAULT: Pwning Linux using Hardware Fault Injection
A little review of security challenges in Silicon Photonics integrated circuits.
Flip a bit, grab a key: symbolic execution edition
Latest Metasploit Hardware Bridge Techniques
Hardware Root of Mistrust
TEMPEST attacks against AES
The RTOS Exploit Mitigation Blues
A Ghost in your Transmitter: analyzing polyglot signals for physical layer covert channels detection
Black Box Debugging of Embedded Industrial Control Systems
Automated Unpacking, Analysis and Comparision of Arbitrary Firmware Images: The Firmware Analysis and Compare Tool (FACT)
Security Analyst at Compass Security Schweiz AG
Xtensa & Mongoose OS exploitation
Using inexpensive consumer-off-the-shelf platforms for high-risk travel security
Car Hacking Village
Who owns your car?
(Un)Dependable Dependencies in Safety-Critical Infrastructure
Subscribe with us by submitting your email address and know more about our future events and updated information.