Keynote:- When Threat Models Meet by Herbert Bos |
|
|
Blackboxing Diebold-Nixdorf ATMs by Vladimir Kononovich |
|
|
Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks by Enrico Barberis & Hany Ragab |
|
|
A Side Journey to Titan - Revealing and Breaking NXP’s P5x ECDSA Implementation on the Way by Dr. Victor Lomné |
|
|
Over the Air-Tag: shenanigans with the most over-engineered keyfinder by Jiska Classen, Fabian Freyer and Stacksmashing |
|
|
Overmedicated: Breaking the security barrier of a B.Braun Infusion pump by Douglas McKee & Philippe Laulheret |
|
|
EEPROM: It Will All End in Tears by Philippe Teuwen & Christian Herrmann |
|
|
Teardown and feasibility study of IronKey - the most secure USB Flash drive by Sergei Skorobogatov |
|
|
Flippin' fake flops for fun, fame and fortune by Jasper van Woudenberg |
|
|
BlueMirror: Defeating Authentication in Bluetooth protocols by Tristan Claverie & Jose Lopes Esteves |
|
|
Automated vulnerability hunting in SMM using Brick by Assaf Carlsbad & Itai Liba |
|
|
Divide & Conquer revisited: FI as a SW EXP primitive by Rafael Boix Carpi & Federico Menarini |
|
|
Supply Chain Security (and attacks) by David Calligaris, Cristofaro Mune, Santos Merino & Jan Geertsma |
|
|
How do we build trustable open source hardware? by Trammell Hudson |
|
|