• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2022
  • 2019
Edition logo

Hardwear.io USA 2024

2024-05-30 - 2024-05-31
  • Thumbnail for the video - click to play

    ►

    Welcome Note
    - John McMaster
  • Thumbnail for the video - click to play

    ►

    State-of-the-Art Anti-Counterfeiting: Attacks And Countermeasures
    - Scott Best
  • Thumbnail for the video - click to play

    ►

    My Car, My Keys: Obtaining CAN Bus SecOC Signing Keys
    - Willem Melching & Greg Hogan
  • Thumbnail for the video - click to play

    ►

    LeapFrog: The Rowhammer Instruction Skip Attack
    - Andrew Adiletta,Caner Tol and Berk Sunar
  • Thumbnail for the video - click to play

    ►

    Integrating AI With Retro Hardware: A Commodore 64 LLM Module
    - Konrad Jędrzejczyk and Marek Zmysłowski
  • Thumbnail for the video - click to play

    ►

    Secrets Of Simos18: Reverse Engineering The Secure Boot Mechanism Of An Engine Control Unit
    - Brian Ledbetter
  • Thumbnail for the video - click to play

    ►

    BarraCUDA: GPUs Do Leak DNN Weights
    - Peter Horvath
  • Thumbnail for the video - click to play

    ►

    The Right To Secure; What, Who, How And Why!
    - Panel
  • Thumbnail for the video - click to play

    ►

    One SMS To Root Them All: Exposing Critical Threats In Millions Of Connected Devices
    - Alexander Kozlov & Sergey Anufrienko
  • Thumbnail for the video - click to play

    ►

    Teaching New Tricks To An Old Micro: Breaking Into Chips By Reading The Datasheet
    - Mark Omo and James Rowley
  • Thumbnail for the video - click to play

    ►

    TPMs And The Linux Kernel: Unlocking A Better Path To Hardware Security
    - Ignat Korchagin
  • Thumbnail for the video - click to play

    ►

    Who Monitors The Monitors? Hacking The Monitor Control Command Set
    - Eugene Lim
  • Thumbnail for the video - click to play

    ►

    Building A Silicon Analysis Toolkit
    - Hash Salehi
  • Thumbnail for the video - click to play

    ►

    Exploring Dual Edges Of SRAM Data Remanence In SoCs: Covert Storage And Exfiltration Risks In TEE
    - Jubayer Mahmod
  • Thumbnail for the video - click to play

    ►

    TPM 2.0 Attestable Firmware: Recovering Trust After Firmware Flaws
    - Chris Fenner and Jeff Andersen
  • Thumbnail for the video - click to play

    ►

    A New Root Of Trust: Changing Computing With Trusted Execution Environments
    - Panel
  • Thumbnail for the video - click to play

    ►

    Prize Ceremony
    - Hardwear.io