image image

Speakers




Keynote Speaker

christopher-tarnovsky

Christopher Tarnovsky

Exposing the deep secure elements of smartcards!

Conference Talks

chrisg

Chris Gerlinsky

Bits from the matrix: Optical ROM extraction
christofaro-mune

Cristofaro Mune

OverTime: Remote Timing Attacks against IoT devices
eric-schlaepfer

Eric Schlaepfer

Cloning a Sound Card
jasper-van-woundenberg

Jasper van Woudenberg

Top 10 secure boot mistakes
john-mcmaster

John McMaster

Infrared Light for Reverse Engineering
dr-joseph-kiniry

Dr. Joseph Kiniry

Nationally Critical Infrastructure needs Secure Hardware—aka Democracy a Critical System
mike-ryan

Mike Ryan

Bluetooth Hacking: Tools and Techniques
raoul-strackx

Raoul Strackx

Speculative execution vulnerabilities: From Simple Oversight to Tech Nightmare
olivier-thomas

Olivier Thomas

Integrated Circuit Offensive Security

Workshops

Grzegorz_Wypych

Grzegorz Wypych

Using Symbolic Execution for IoT Bug Hunting


kate-temkin

Kate Temkin & Mikaela Szekely

Hacking USB on the Cheap: Breaking USB without Breaking the Bank
mike-hamburg

Michael Hamburg

Post-quantum cryptography                            


CXO Speakers

cory-scott

Cory Scott

Head of Security and Privacy at Google Nest


hemant-raju

Hemant Raju

Director of Security and Privacy Engineering at SmartThings


maggie-jauregui

Maggie Jauregui

Firmware Security Researcher at Intel


mike-shema

Mike Shema

Head of Product Security at Square


cory-scott

Rob Wood

Director of Hardware Security at NCC Group


jon-callas

Jon Callas

Senior Technology Fellow at ACLU


jonathan-valamehr

Dr. Jonathan Valamehr

Co-founder of Tortuga Logic
robert-van-spyk

Robert Van Spyk

Hardware Security Researcher at NVIDIA
christopher-harrell

Christopher Harrell

VP of Global Engineering & Technology at Yubico