image image

Speakers




Keynote Speaker

Scott Best

Scott Best


State-of-the-Art Anti-Counterfeiting: Attacks and Countermeasures

Technical Speakers

Alexander Kozlov & Sergey Anufrienko

Alexander Kozlov & Sergey Anufrienko


One SMS to root them all: exposing critical threats in millions of connected devices
Andrew Adiletta, Caner Tol & Berk Sunar

Andrew Adiletta, Caner Tol & Berk Sunar


LeapFrog: The Rowhammer Instruction Skip Attack
Brian Ledbetter

Brian Ledbetter


Secrets of Simos18: Reverse Engineering the secure boot mechanism of an Engine Control Unit
Eugene Lim

Eugene Lim


Who Monitors the Monitors? Hacking the Monitor Control Command Set
Hash Salehi

Hash Salehi


Building a Silicon Analysis Toolkit
Ignat Korchagin

Ignat Korchagin


TPMs and the Linux Kernel: unlocking a better path to hardware security
Jubayer Mahmod

Jubayer Mahmod


Exploring Dual Edges of SRAM Data Remanence in SoCs: Covert Storage and Exfiltration Risks in TEE
Konrad Jędrzejczyk & Marek Zmysłowski

Konrad Jędrzejczyk & Marek Zmysłowski


Integrating AI with Retro Hardware: A Commodore 64 LLM Module
Mark Omo & James Rowley

Mark Omo & James Rowley


Teaching New Tricks to an Old Micro: Breaking into Chips By Reading the Datasheet
Peter Horvath

Peter Horvath


BarraCUDA: GPUs do Leak DNN Weights
Willem Melching & Greg Hogan

Willem Melching & Greg Hogan


My car, My keys: obtaining CAN bus SecOC signing keys

Workshops

Dennis Giese

Dennis Giese


Hands-on IoT firmware extraction and forensics of eMMC flash
Ken, Alex, John, and Antoine

Ken, Alex, John, and Antoine


Handson Decapping & Wire bonding Chips

Panel Speakers

Mike Bursell

Mike Bursell


Confidential Computing Consortium
Nathaniel McCallum

Nathaniel McCallum


ARM
~