-
Opening Note
- Antriksh Shah
-
Reverse Engineering Is Good For Soul
- Travis Goodspeed
-
Popping Locks, Stealing Cars, And Breaking A Billion
Other Things: Bluetooth LE Link Layer Relay Attacks
- Sultan Qasim Khan
-
Using EMC Testing Equipment As A New
Side Channel Acquisition Technique
- Nicolas Oberli and Benjamin Vernoux
-
How To Tame Your Robot
- Jiska Classen and Fabian Freyer
-
Rethinking Trusted Execution Environments
In The Age Of Reconfigurable Computing
- Sérgio Pereira and Dr. Sandro Pinto
-
Assessing The Security Of An SMM Supervisor
- Ilja Van Sprundel
-
Using A Magic Wand To Break
The IPhone's Last Security Barrier
- Tihmstar
-
How Can We Make Hardware Bug Bounties Better?
- Panel
-
Practical Invasive Attacks, How The Hardware
is Hacked For Compatible Product Creation?
- Thomas Olivier
-
Hardware Attacks Against SM4 In Practice
- Sylvain Pelissier and Nicolas Oberli
-
Bypass NXP LPC-Family Debug Check
with Voltage Fault Injection
- Waleed AlZamil and Bandar Alharbi
-
Blackbox Fuzzing With Side Channels
- Sergei Volokitin
-
HandPwning: Security Pitfalls Of Hand-geometry
recognition-based Access Control Systems
- Luca Bongiorni
-
An Overview Of The Security Of
Some Hardware FIDO(2) Tokens
- Victor Lomne
-
Closing Note & Prize Ceremony
- Hardwear.io