Keynote:- Integrated-Circuit Surgery: getting to the heart of the problem with the smallest scalpel by John Walker |
|
|
RIDLed with CPU bugs by Alyssa Milburn & Stephan van Schaik |
|
|
Exposing device features on 4G & 5G networks by Altaf Shaik & Ravishankar Borgaonkar |
|
|
Workshop:- Enter FACT: Boost your firmware security analysis with automation, visualization, and cross referencing by Johannes vom Dorp & Peter Weidenbach |
|
|
It's easier to break than to patch: a stealthy DoS attack against CAN by Stefano Zanero & Stefano Longari |
|
|
Hacking pre-obd car for fun and horsepower by Gyver Ferrand |
|
|
Workshop:- Scaffold board showcase by Olivier Heriveaux & Karim Abdellatif |
|
|
Hardware security evaluation of Intel MAX 10 FPGAs: from feasibility study to security boundaries by Sergei Skorobogatov |
|
|
Enclosure PUF: Tamper Proofing Commodity Hardware & other Applications by Christian Zenger & Lars Steinschulte |
|
|
CXO PANEL:- Supply Chain Security - Mission Impossible? |
|
|
Keynote:- Roots of Trust and Attestation by Trammell Hudson |
|
|
Poking the S in SD cards by Nicolas Oberli |
|
|
Workshop:- How to Build & Secure a RISC-V Embedded System by Cesare Garlati & Prof. Sandro Pinto |
|
|
Day-1 with a TTIG-868 by Brian Butterly |
|
|
Sniffle: A low cost sniffer for Bluetooth 5 by Sultan Qasim Khan |
|
|
When hardware attacks scale by Marc Witteman |
|
|
Electric vehicle CAN man-in-the-middling by Emile Nijssenv |
|
|
CXO PANEL:- Security Certifications for IoT Devices |
|
|