Date | Timing | Training Name | Training Room | |
---|---|---|---|---|
28th May - 30th May 2024 (3 Days) |
8:15 to 9:00 | Registration | ||
Start | 9:00 | Applied Fault Injection | Salon A | |
Practical Hardware Hacking Basics + Bonus Day! | Salon B | |||
Security assessment of Bluetooth Low Energy devices | Salon C | |||
Coffee Break | 11:00 to 11:15 | Hands-on Car Hacking | Salon D | |
SDR Hacking advanced: Reversing and exploiting wireless communications | Salon E | |||
Lunch Break | 13:00 to 14:00 | Unlocking the secrets within ROMs | Newport Beach | |
Medical Device Hacking & Defense | Prospector Suites B | |||
Coffee Break | 15:45 to 16:00 | x86-64 Intel Firmware Attack & Defense | Prospector Suites A | |
Embedded C/C++ Implementation Vulnerabilities | ||||
End | 17:30 | Risc-V Assembly | ||
Xeno's All You Can Learn Buffet | ||||
30 May 2024 | 5:45 PM to 6:30 PM | [AGENDA] MTVRE Meetup and Talks | ||
08:15 | 09:20 | Registration | ||
09:20 | 09:30 | Opening Note | ||
09:30 | 10:10 | [KEYNOTE] State-of-the-Art Anti-Counterfeiting: Attacks and Countermeasures by Scott Best | ||
10:15 | 10:55 | My car, My keys: obtaining CAN bus SecOC signing keys by Willem Melching & Greg Hogan | ||
10:55 | 11:15 | Coffee Break | ||
11:20 | 12:00 | LeapFrog: The Rowhammer Instruction Skip Attack by Andrew Adiletta, Caner Tol & Berk Sunar | ||
12:05 | 12:45 | Integrating AI with Retro Hardware: A Commodore 64 LLM Module by Konrad Jędrzejczyk & Marek Zmysłowski | ||
12:45 | 14:00 | Lunch Break | ||
14:00 | 14:40 | Secrets of Simos18: Reverse Engineering the secure boot mechanism of an Engine Control Unit by Brian Ledbetter | ||
14:45 | 15:25 | BarraCUDA: GPUs do Leak DNN Weights by Peter Horvath | ||
15:30 | 16:10 | [Panel] The Right To Secure; What, Who, How and Why! | ||
16:10 | 16:25 | Coffee Break | ||
16:25 | 17:05 | One SMS to root them all: exposing critical threats in millions of connected devices by Alexander Kozlov & Sergey Anufrienko | ||
19:00 | 21:30 | Invite Only Dinner & Drinks | ||
09:30 | 10:10 | Teaching New Tricks to an Old Micro: Breaking into Chips By Reading the Datasheet by Mark Omo & James Rowley | ||
10:15 | 10:55 | TPMs and the Linux Kernel: unlocking a better path to hardware security by Ignat Korchagin | ||
10:55 | 11:15 | Coffee Break | ||
11:20 | 12:00 | Who Monitors the Monitors? Hacking the Monitor Control Command Set by Eugene Lim | ||
12:05 | 12:45 | Building a Silicon Analysis Toolkit by Hash Salehi | ||
12:45 | 14:00 | Lunch Break | ||
14:00 | 14:40 | Exploring Dual Edges of SRAM Data Remanence in SoCs: Covert Storage and Exfiltration Risks in TEE by Jubayer Mahmod | ||
14:45 | 15:25 | TPM 2.0 Attestable Firmware: Recovering Trust after Firmware Flaws by Chris Fenner & Jeff Andersen | ||
15:30 | 16:10 | [Panel] A new root of trust: changing computing with Trusted Execution Environments | ||
16:10 | 16:25 | Coffee Break | ||
16:25 | 17:00 | Prize Ceremony |
* Pacific Daylight Time (PDT)