-
Opening Note
- Antriksh Shah
-
Hacking With AI: Our Journey
Through The Perils & Promises
- Dhinesh Manoharan
-
Blue2thprinting (blue-[tooth)-printing]:
Answering The Question Of 'WTF Am I Even Looking At?!'
- Xeno Kovah
-
Triple Exploit Chain With Laser
Fault Injection On A Secure Element
- Olivier Heriveaux
-
CSI:Rowhammer - Cryptographic Security
And Integrity Against Rowhammer
- Jonas Juffinger
-
How Deep Is The Rabbit Hole? A Deep Dive
Into Exploitation Of A Popular Smart Speaker
- Sergei Volokitin
-
Dissecting The Modern Android Data Encryption Scheme
- Maxime Rossi Bellom & Damiano Melotti
-
A New Future For IoT Security: Better Solutions And What Did Not Work So Far
- Panel
-
Automated Fault Injection Attacks
On Embedded Devices
- Enrico Pozzobon & Nils Weiss
-
Basebanheimer: Now I Am Become
Death, The Destroyer Of Chains
- Daniel Komaromy
-
Attacking Vehicle Fleet Management Systems
- Yashin Mehaboobe & Ramiro Pareja Veredas
-
TEEzz: Fuzzing Trusted Applications
On COTS Android Devices
- Marcel Busch
-
Understanding Physics To Break AES Encryption
With Custom Side-channel Hardware
- Stephan Mathieu & Roman Korkikian
-
Hacking A Smart Doorbell:
An IoT Hacking Guide
- Daniel Schwendner
-
Protect Your Screen From Eavesdropping:
Don’t Forget Its Power Supply
- Emmanuel Cottais
-
Breaking Secure Boot On The
Silicon Labs Gecko Platform
- Benoît Forgette & Sami Babigeon
-
Closing Ceremony & Prize
- Antriksh Shah