-
Opening Note
- Antriksh Shah
-
When Threat Models Meet
- Herbert Bos
-
Over The Air-Tag: Shenanigans With
The Most Over-engineered Keyfinder
- Jiska Classen and Fabian Freyer And Thomas Roth
-
A Side Journey To Titan - Revealing And Breaking
NXP’s P5x ECDSA Implementation On The Way
- Victor Lomné
-
Automated Vulnerability Hunting In SMM Using Brick
- Assaf Carlsbad
-
Flippin‘ Fake Flops For Fun, Fame And Fortune
- Jasper Van Woudenberg
-
Overmedicated: Breaking The Security
Barrier Of A B.Braun Infusion Pump
- Douglas McKee and Philippe Laulheret
-
How Do We Build Trustable Open Source Hardware?
- Trammell Hudson and Fredrik Strömberg
-
Supply Chain Security (And Attacks)
- David Calligaris,Cristofaro Mune,Santos Merino and Jan Geertsma
-
Rage Against The Machine Clear: A Systematic Analysis Of Machine
Clears And Their Implications For Transient Execution Attacks
- Enrico Barberis & Hany Ragab
-
Teardown And Feasibility Study Of IronKey:
The Most Secure USB Flash Drive
- Sergei Skorobogatov
-
Blackboxing Diebold-Nixdorf ATMs
- Vladimir Kononovich
-
EEPROM: It Will All End In Tears
- Philippe Teuwen & Christian Herrmann
-
Divide & Conquer Revisited:
FI As A SW EXP Primitive
- Rafael Boix Carpi & Federico Menarini
-
BlueMirror:
Defeating Authentication In Bluetooth Protocols
- Tristan Claverie & Jose Lopes Esteves
-
Closing Note & Prize
- Hardwear.io