-
Opening Note
- Antriksh Shah
-
Exploiting Something Deeply Hidden:
Signals, Silence, And Secrets
- Samy Kamkar
-
EL3vated Privileges:
Glitching Google Wifi Pro From Root To EL3
- Cristofaro Mune
-
Why 'Adams Bridge' Leaks:
Attacking A PQC Root-Of-Trust
- Markku-Juhani O. Saarinen
-
Skimmers, Shimmers, And You: Reverse Engineering
Card Skimmers To Retrieve Stolen Payment Information
- Aidan Quimby
-
Tracing The Untraceable: Extracting
Protected Flash With STM32-TraceRip
- Mark Omo & James Rowley
-
Analog IC Design With Tiny Tapeout
- John McMaster
-
Zephyr Security: Breezing Through
Internals, Threats, And Hardening
- Eric Evenchick
-
Hardware Hacking A Car’s Head Unit
And Uncovering A Vulnerable RTOS
- Danilo Erazo
-
Exploiting A Blind Format String Vulnerability
In Modern IoT Devices: A Pwn2Own 2024 Case Study
- Baptiste Moine
-
Building A Gameboy Cartridge Dumper
- Tihmstar
-
New Kinds Of Tools For
Maintaining And Sustaining Software
- Sergey Bratus
-
Making Integrated-Circuit Supply Chain Validation
An Easier Task In The Context Of Open-Source Silicon
- Olivier Thomas
-
BAM BAM On A Budget: You CAN Do It!
- Hash Salehi
-
Weaknesses And Vulnerabilities
In The PowerG Wireless Radio Protocol
- James Chambers & Sultan Qasim Khan
-
Six Years Of Rowhammer:
Breakthroughs And Future Directions
- Stefan Saroiu
-
Journey Into JTAG
- Ryan Grachek
-
Smart Security: Protecting Embedded
Medical Devices For A Safer Tomorrow
- Panel
-
How Research Influences Product Security
- Panel
-
Prize Ceremony
- Hardwear.io