image image

Speakers




Technical Speaker

Aidan Quimby

Aidan Quimby


Skimmers, Shimmers, and You: Reverse Engineering Card Skimmers to Retrieve Stolen Payment Information
Creased

Creased


Exploiting a Blind Format String Vulnerability in Modern IoT Devices: A Pwn2Own 2024 Case Study
Cristofaro Mune

Cristofaro Mune


EL3vated Privileges: Glitching Google Wifi Pro from Root to EL3
Danilo Erazo

Danilo Erazo


Hardware Hacking a Car’s Head Unit & Uncovering a Vulnerable RTOS
Eric Evenchick

Eric Evenchick


Zephyr Security: Breezing Through Internals, Threats, and Hardening
Hash Salehi

Hash Salehi


BAM BAM on a Budget: You CAN Do It!
Mark Omo & James Rowley

Mark Omo & James Rowley


Tracing the Untraceable: Extracting Protected Flash with STM32-TraceRip
Markku-Juhani O. Saarinen

Markku-Juhani O. Saarinen


Why 'Adams Bridge' Leaks: Attacking a PQC Root-of-Trust
Olivier Thomas

Olivier Thomas


Making Integrated-Circuit Supply Chain Validation an Easier Task in the Context of Open-Source Silicon
Ryan Grachek

Ryan Grachek


Journey into JTAG

Workshop & Villages

Dennis Giese

Dennis Giese


Hands-on IoT firmware extraction and flash forensics