image image

Speakers




Keynote Speaker

Joe Grand

Travis Goodspeed

Speakers

Ilja van Sprundel

Ilja van Sprundel


Assessing the security of an SMM supervisor

Jiska Classen & Fabian Freyer

Jiska Classen & Fabian Freyer

How To Tame Your Robot


Luca Bongiorni

Luca Bongiorni

HandPwning: security pitfalls of hand-geometry recognition-based access control systems


Nicolas Oberli & Benjamin Vernoux

Nicolas Oberli & Benjamin Vernoux

Using EMC testing equipment as a new side channel acquisition technique

Sergei Volokitin

Sergei Volokitin


Blackbox fuzzing with side channels

Sérgio Pereira & Dr. Sandro Pinto

Sérgio Pereira & Dr. Sandro Pinto

Rethinking Trusted Execution Environments in the Age of Reconfigurable Computing

Sultan Qasim Khan

Sultan Qasim Khan

Popping Locks, Stealing Cars, and Breaking a Billion Other Things: Bluetooth LE Link Layer Relay Attacks

Sylvain Pelissier & Nicolas Oberli

Sylvain Pelissier & Nicolas Oberli

Hardware attacks against SM4 in practice

Thomas Olivier

Thomas Olivier


Practical Invasive Attacks, How the Hardware is Hacked for Compatible Product Creation?
Tihmstar

Tihmstar


Using a magic wand to break the iPhone's last security barrier

Waleed AlZamil & Bandar Alharbi

Waleed AlZamil & Bandar Alharbi

Bypass NXP LPC-Family debug check with Voltage Fault Injection


Village & Workshop

Christopher Krah & Jörg Stucke

Christopher Krah & Jörg Stucke

Firmware Security Village


Witold Waligora

Witold Waligora

Two vulnerabilities per line of code: a low-cost side-channel story

Xeno Kovah

Xeno Kovah

Go Below MMIO: Examining SPI flash transactions on Intel x86 systems

Panel

Victor Vuillard

Victor Vuillard