image image

Speakers




Keynote Speaker

Joe Grand

Travis Goodspeed

Reverse Engineering is Good for Soul

Technical Speakers

Dr. Victor Lomne

Dr. Victor Lomne


An Overview of the Security of Some Hardware FIDO(2) Tokens

Ilja van Sprundel

Ilja van Sprundel


Assessing the security of an SMM supervisor

Jiska Classen & Fabian Freyer

Jiska Classen & Fabian Freyer

How To Tame Your Robot


Luca Bongiorni

Luca Bongiorni

HandPwning: security pitfalls of hand-geometry recognition-based access control systems


Nicolas Oberli & Benjamin Vernoux

Nicolas Oberli & Benjamin Vernoux

Using EMC testing equipment as a new side channel acquisition technique

Sergei Volokitin

Sergei Volokitin


Blackbox fuzzing with side channels

Sérgio Pereira & Dr. Sandro Pinto

Sérgio Pereira & Dr. Sandro Pinto

Rethinking Trusted Execution Environments in the Age of Reconfigurable Computing


Sultan Qasim Khan

Sultan Qasim Khan

Popping Locks, Stealing Cars, and Breaking a Billion Other Things: Bluetooth LE Link Layer Relay Attacks

Sylvain Pelissier & Nicolas Oberli

Sylvain Pelissier & Nicolas Oberli

Hardware attacks against SM4 in practice



Thomas Olivier

Thomas Olivier


Practical Invasive Attacks, How the Hardware is Hacked for Compatible Product Creation?
Tihmstar

Tihmstar


Using a magic wand to break the iPhone's last security barrier

Waleed AlZamil & Bandar Alharbi

Waleed AlZamil & Bandar Alharbi

Bypass NXP LPC-Family debug check with Voltage Fault Injection


Village & Workshop

Christopher Krah & Jörg Stucke

Christopher Krah & Jörg Stucke

Firmware Security Village


Witold Waligora

Witold Waligora

Two vulnerabilities per line of code: a low-cost side-channel story


Xeno Kovah

Xeno Kovah

Go Below MMIO: Examining SPI flash transactions on Intel x86 systems


Panel Speakers

Andreas Junestam

Andreas Junestam

Meta
Eduardo Vela

Eduardo Vela

Google
Victor Vuillard

Victor Vuillard

Parrot