Conference Day ONE - 30th April 2020 |
|||
---|---|---|---|
START (PDT GMT-7) |
END (PDT GMT-7) |
MAIN TRACK | BREAKOUT ROOM TRACK |
9:30 | 10:00 | Registration Checkin | |
10:00 | 10:30 | LVI: Hijacking Transient Execution with Load Value Injection by Daniel Gruss and Jo Van Bulck | |
10:30 | 10:40 | Q&A | |
10:40 | 11:10 | Firmly Rooted in Hardware: Practical protection from firmware attacks in hardware supply chain by Sophia D'Antoine and Jeff Spielberg | Discussion with Daniel Gruss and Jo Van Bulck |
11:10 | 11:20 | Q&A | |
11:20 | 11:30 | Coffee Break | Discussion with Sophia D'Antoine and Jeff Spielberg (30 min) |
11:30 | 12:00 | Breaking Deployed Crypto, The Side-channel Analyst's Way by Daniel Moghimi | |
12:00 | 12:10 | Q&A | |
12:10 | 12:40 | From the Bluetooth Standard to Standard Compliant 0-days by Daniele Antonioli and Mathias Payer | Discussion with Daniel Moghimi |
12:40 | 12:50 | Q&A | |
12:50 | 13:20 | Starbleed or The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs by Maik Ender | Discussion with Daniele Antonioli and Mathias Payer |
9:30 | 10:00 | Registration Checkin | |
10:00 | 10:30 | Capturing Mask ROMs by John McMaster | |
10:30 | 10:40 | Q&A | |
10:40 | 11:10 | Reverse engineering of deep learning architectures via side-channel attacks by Stjepan Picek | Discussion with John McMaster |
11:10 | 11:20 | Q&A | |
11:20 | 11:30 | Coffee Break | Discussion with Stjepan Picek (30 min) |
11:30 | 12:00 | Defeating TLS client authentication using fault attacks by Nicolas Oberli & Sylvain Pelissier | |
12:00 | 12:10 | Q&A | |
12:10 | 12:40 | Hints from Hardware Security for solving real-world challenges by Dr. Sergei Skorobogatov | Discussion with Nicolas Oberli & Sylvain Pelissier |
12:40 | 12:50 | Q&A | |
12:50 | 13:05 | Wall Challenge, Winner Announcement | |
13:05 | 13:20 | Capture the Signal CTF, Winner Announcement |
* PDT: Pacific Daylight Time
* GMT: Greenwich Mean Time Zone