-
Welcome Note
- John McMaster
-
State-of-the-Art Anti-Counterfeiting:
Attacks And Countermeasures
- Scott Best
-
My Car, My Keys:
Obtaining CAN Bus SecOC Signing Keys
- Willem Melching & Greg Hogan
-
LeapFrog: The Rowhammer Instruction Skip Attack
- Andrew Adiletta,Caner Tol and Berk Sunar
-
Integrating AI With Retro Hardware:
A Commodore 64 LLM Module
- Konrad Jędrzejczyk and Marek Zmysłowski
-
Secrets Of Simos18: Reverse Engineering The
Secure Boot Mechanism Of An Engine Control Unit
- Brian Ledbetter
-
BarraCUDA: GPUs Do Leak DNN Weights
- Peter Horvath
-
The Right To Secure;
What, Who, How And Why!
- Panel
-
One SMS To Root Them All: Exposing Critical
Threats In Millions Of Connected Devices
- Alexander Kozlov & Sergey Anufrienko
-
Teaching New Tricks To An Old Micro:
Breaking Into Chips By Reading The Datasheet
- Mark Omo and James Rowley
-
TPMs And The Linux Kernel: Unlocking
A Better Path To Hardware Security
- Ignat Korchagin
-
Who Monitors The Monitors?
Hacking The Monitor Control Command Set
- Eugene Lim
-
Building A Silicon Analysis Toolkit
- Hash Salehi
-
Exploring Dual Edges Of SRAM Data Remanence In SoCs:
Covert Storage And Exfiltration Risks In TEE
- Jubayer Mahmod
-
TPM 2.0 Attestable Firmware:
Recovering Trust After Firmware Flaws
- Chris Fenner and Jeff Andersen
-
A New Root Of Trust: Changing Computing With Trusted Execution Environments
- Panel
-
Prize Ceremony
- Hardwear.io