Hardwear.io Netherlands 2022 Links
| Date | Timing | Training Name | Training Room | |
|---|---|---|---|---|
| 24-26 Oct 2022 | 8:15 to 9:00 | Registration | ||
| Start | 9:00 | Practical Car Hacking | Van Gogh | |
| Unlocking the secrets within ROMs | Picasso | |||
| Coffee Break | 11:00 to 11:15 | Reverse Engineering Firmware with Ghidra | Vermeer | |
| Practical Hardware Hacking Basics + Bonus Day! | Gauguin | |||
| Lunch Break | 13:00 to 14:00 | TEEPwn: Breaking Trusted Execution Environments | Rembrandt | |
| Attacking real-world crypto in embedded systems with side-channel & fault analysis | Mondriaan | |||
| Coffee Break | 15:45 to 16:00 | SDR Hacking Essential: Break into most RF communications | Dali | |
| Reverse-Engineering, Emulation, and Dynamic Testing of Cellular Baseband Firmware | Monet | |||
| Embedded C/C++ Implementation Vulnerabilities | Potter | |||
| End | 17:30 | x86-64 Intel Firmware Attack & Defense | ||
| Xeno's All You Can Learn Buffet | ||||
| 08:00 | 09:20 | Registration | ||
| 09:20 | 09:30 | Opening Note | ||
| 09:30 | 10:15 | [KEYNOTE] Reverse Engineering is Good for Soul by Travis Goodspeed | ||
| 10:15 | 11:00 | Popping Locks, Stealing Cars, and Breaking a Billion Other Things: Bluetooth LE Link Layer Relay Attacks by Sultan Qasim Khan | ||
| 11:00 | 11:15 | Coffee Break | ||
| 11:15 | 12:00 | Using EMC testing equipment as a new side channel acquisition technique by Nicolas Oberli & Benjamin Vernoux | ||
| 12:00 | 12:45 | How To Tame Your Robot by Jiska Classen & Fabian Freyer | ||
| 12:45 | 14:00 | Lunch Break | ||
| 14:00 | 14:45 | Rethinking Trusted Execution Environments in the Age of Reconfigurable Computing by Sérgio Pereira & Dr. Sandro Pinto | ||
| 14:45 | 15:30 | Assessing the security of an SMM supervisor by Ilja van Sprundel | ||
| 15:30 | 15:45 | Coffee Break | ||
| 15:45 | 16:30 | Using a magic wand to break the iPhone's last security barrier by Tihmstar | ||
| 16:30 | 17:15 | [Panel] How can we make hardware bug bounties better? | ||
| 17:15 | 18:00 | Social Networking | ||
| 19:30 | 21:30 | Invite Only Dinner & Drinks | ||
| 09:30 | 10:15 | Practical Invasive Attacks, How the Hardware is Hacked for Compatible Product Creation? by Thomas Olivier | ||
| 10:15 | 11:00 | Hardware attacks against SM4 in practice by Sylvain Pelissier & Nicolas Oberli | ||
| 11:00 | 11:15 | Coffee Break | ||
| 11:15 | 12:00 | Bypass NXP LPC-Family debug check with Voltage Fault Injection by Waleed AlZamil & Bandar Alharbi | ||
| 12:00 | 12:45 | Blackbox fuzzing with side channels by Sergei Volokitin | ||
| 12:45 | 14:00 | Lunch Break | ||
| 14:00 | 14:45 | HandPwning: security pitfalls of hand-geometry recognition-based access control systems by Luca Bongiorni | ||
| 14:45 | 15:30 | An Overview of the Security of Some Hardware FIDO(2) Tokens by Victor Lomne | ||
| 15:30 | 15:45 | Coffee Break | ||
| 15:45 | 16:30 | TBA | ||
| 16:30 | 17:15 | Closing Ceremony & Prize | ||
| 17:15 | 18:00 | Networking with Beers & Samosa | ||
* Central European Summer Time (CEST)