-
Opening Note
- Antriksh Shah
-
The Microarchitectures That I Saw
And The Ones That I Hope To One Day See
- Rodrigo Branco
-
"Un-fare Advantageā - Hacking The
MBTA CharlieCard From 2008 To Present
- Bobby Rauch
-
OneKey Is All It Takes: The Misuse Of
Secure Components In Hardware Wallets
- Michael Mouchous & Karim Abdellatif
-
Back To The Future With Platform Security
- Enrique Nissim,Joseph Tartaro and Krzysztof Okupski
-
Affordable EMFI Attacks
Against Modern IoT Chips
- Davide Toldo
-
Evolution Of A Side Channel - Benchmarking The
Static Power Vulnerability Of Four CMOS Generations
- Thorben Moos
-
Data Leakage: A Multi-Source Threat
- Panel
-
Building A Modern Bluetooth Sniffer
- Mike Ryan
-
Hardware Security For Cloud Storage Providers
- Panel
-
BreakMi: Reversing, Exploiting And Fixing
Xiaomi (And Fitbit) Fitness Tracking Ecosystems
- Marco Casagrande and Daniele Antonioli
-
How To Hack Shannon Baseband (from A Phone)
- Natalie Silvanovich
-
Inside Apple's Lightning:
JTAGging The IPhone For Fuzzing And Profit
- Thomas Roth
-
Next-Gen Exploitation:
Exploring The PS5 Security Landscape
- Specter
-
Red Team Vs. Blue Team: A Real-World Hardware Trojan Detection
Case Study Across Four Modern CMOS Technology Generations
- Endres Puschner and Steffen Becker
-
Cryo-Mechanical RAM Content Extraction:
A DIY Cold Boot Robot For A Thousand Bucks
- Ang Cui
-
Securing The Unseen: Vulnerability
Research In Confidential Computing
- Josh Eads and Cfir Cohen
-
Thank You & Prize Giving Ceremony
- Antriksh Shah