Schedule for Hardware Security Conference & Training, USA 2019
Type | Dates | Training Timings | Training Name | Training Room | |
---|---|---|---|---|---|
2-Days Training | 11th - 12th June 2019 | Start | 9:00 | Attacking ARM TrustZone | San Jose |
Morning Coffee Break | 10:45 to 11:00 | Integrated Circuits Reverse Engineering & Embedded Code Extraction Techniques | Santa Clara | ||
Lunch | 12:30 to 13:30 | TEE Offensive Core | Tiburon | ||
Afternoon Coffee Break | 15:45 to 16:00 | Embedded Security for Automotive – Red Team Edition | Monterey | ||
End | 17:30 | Low-Level Hardware Reversing | Carmel |
Note: Training registration desk will open on 11th June at 8:00 am. Please come in advance to collect your training Badge.
Start | End | Talks (Salon 1) |
Workshops (San Jose) |
Exhibition, CTFs & Village (Salon 2 & Salon 3) |
---|---|---|---|---|
08:00 | 09:30 | Registration | ||
09:30 | 10:15 | Keynote:- Exposing the deep secure elements of smartcards by Christopher Tarnovsky | ||
10:15 | 11:00 | Bits from the matrix: optical ROM extraction by Chris Gerlinsky |
|
|
11:00 | 11:15 | Coffee Break | ||
11:15 | 12:00 | OverTime: Remote Timinig Attacks against IoT devices by Cristofaro Mune | Workshop:- Hacking USB on the Cheap by Kate Temkin & Mikaela Szekely | |
12:00 | 12:45 | Bluetooth Hacking: Tools and Techniques by Mike Ryan | ||
12:45 | 14:00 | Lunch Break | ||
14:00 | 14:45 | Cloning a Sound Card by Eric Schlaepfer | Workshop:- Post-quantum cryptography by Michael Hamburg | |
14:45 | 15:30 | Nationally Critical Infrastructure needs Secure Hardware—aka Democracy a Critical System by Dr. Joseph Kiniry | ||
15:30 | 16:00 | Coffee Break | ||
16:00 | 16:45 | CXO Panel:- Hardware Security By Design | ||
16:45 | 17:30 | Networking Session | ||
19:30 | 21:30 | Silent Disco Party |
Note: Those registered with Student Conference Pass are requested to carry their valid Student ID.
Start | End | Talks (Salon 1) |
Workshops (San Jose) |
Exhibition, CTFs & Village (Salon 2 & Salon 3) |
---|---|---|---|---|
10:00 | 11:00 | Keynote:- Sophisticated million dollar hack, to discover weaknesses in a series of smartcards affecting millions by Christopher Tarnovsky | ||
11:00 | 11:15 | Coffee Break | ||
11:15 | 12:00 | Infrared Light for Reverse Engineering by John McMaster | Workshop:- Using Symbolic Execution for IoT Bug Hunting by Grzegorz Wypych |
|
12:00 | 12:45 | Speculative execution vulnerabilities: From a Simple Oversight to a Technological Nightmare by Raoul Strackx | ||
12:45 | 14:00 | Lunch Break | ||
14:00 | 14:45 | Integrated Circuit Offensive Security by Olivier Thomas | ||
14:45 | 15:30 | CXO Panel:- Unique challenges of security programs for hardware / IoT makers | ||
15:30 | 16:00 | Coffee Break | ||
16:00 | 16:45 | Top 10 secure boot mistakes by Jasper van Woudenberg | ||
16:45 | 17:15 | CTF Winner and announcements |