image image

Speakers




Nicolas Oberli & Sylvain Pelissier

Nicolas Oberli & Sylvain Pelissier

Defeating TLS client authentication using fault attacks


Daniel Gruss & Jo Van Bulck

Daniel Gruss & Jo Van Bulck

LVI: Hijacking Transient Execution with Load Value Injection

Sophia d’Antoine and Jeff Spielberg

Sophia d’Antoine and Jeff Spielberg

Firmly Rooted in Hardware: Practical protection from firmware attacks in hardware supply chain
Daniel Moghimi

Daniel Moghimi

Breaking Deployed Crypto, The Side-channel Analyst's Way

Nicolas and sylvain pelissier

Daniele Antonioli and Mathias Payer

From the Bluetooth Standard to Standard Compliant 0-days

John McMaster

John McMaster

Capturing Mask ROMs


Stjepan Picek

Stjepan Picek

Reverse engineering of neural network architectures via side channel
Maik Ender

Maik Ender

Starbleed or The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs
Dr-Sergei-Skorobogatov

Dr. Sergei Skorobogatov

Hints from Hardware Security for solving real-world challenges