-
Challenging Real-World Targets:
From iPhone To Insulin Pump
- Dr. Sergei Skorobogatov
-
A Ghost In Your Transmitter: Analyzing Polyglot
Signals For Physical Layer Covert Channels Detection
- Emmanuel Cottais,Chaouki Kasmi and José Lopes Esteves
-
Latest Metasploit Hardware Bridge Techniques
- Craig Smith
-
Reverse Engineering Of Programmable Logic Bitstreams
- Andrew Zonenberg
-
Flip A Bit, Grab A Key: Symbolic Execution Edition
- Jasper van Woudenberg
-
To Guess Wrong Is Expensive: A Deduce & Remove Attack On
Blinded Scalar Multiplication With Asynchronous Perf-Ioctl Calls
- Sarani Bhattacharya
-
Shaking Trust In Hardware: Attacks On Hardware From
Software, Rowhammer And An MMU Side Channel From Javascript
- Ben Gras and Kaveh Razavi
-
CXO Panel: Who Owns Your Car?
- Dr. Ana Magazinius,Abe T. Chen,Beau Woods,Xander C.W. Heemskerk and Lies Alderlieste
-
Hardware Trojans And The Internet Of Things
- Dr. Christof Paar
-
Hardware Root Of Mistrust
- Joe FitzPatrick
-
KERNELFAULT:
Pwning Linux Using Hardware Fault Injection
- Niek Timmers and Cristofaro Mune
-
A Little Review Of Security Challenges
In Silicon Photonics Integrated Circuits
- Alexander Bolshev
-
TEMPEST Attacks Against AES
- Craig Ramsay
-
The RTOS Exploit Mitigation Blues
- Jos Wetzels
-
CXO Panel: (Un)Dependable Dependencies In Safety-Critical Infrastructure
-
-
Hack Your Body, One Implant At A Time
- Patrick Paumen
-
Prize Distribution For The CTF
-