Top 10 secure boot mistakes | Jasper van Woudenberg [@jzvw]
This talk presents an overview of all things that can go wrong when developers attempt to implement a chain of trust also called ‘secure boot’.
Read MoreJun 14, 2019 | Hardware Hacking, hardwear.io USA 2019 Talks | 0
This talk presents an overview of all things that can go wrong when developers attempt to implement a chain of trust also called ‘secure boot’.
Read MoreJun 14, 2019 | CXO Panel Discussion, Hardware Hacking, hardwear.io USA 2019 Talks, IoT Security | 0
This is a CXO panel discusssion from hardwear.io | Hardware Security Conference & Training, USA 2019.
Read MoreJun 14, 2019 | Hardware Hacking, hardwear.io USA 2019 Talks, IC Reversing | 0
This talk showcases how hardware offensive security represents a tailored answer to both the developers of secure solutions and the parties willing to extract data from highly protected devices.
Read MoreJun 14, 2019 | Hardware Hacking, hardwear.io USA 2019 Talks | 0
Since the discovery of Spectre & Meltdown, about 7 other speculative execution vulnerabilities have been discovered. These attacks can have a devastating impact. In this talk Raoul focused on the key issue with these attacks, and with Foreshadow/L1TF as a specific example.
Read MoreJun 14, 2019 | Hardware Hacking, hardwear.io USA 2019 Talks, IC Reversing | 0
This talk explored correlating infrared emissions to logic functions. While traditionally prohibitively expensive, relatively low-cost techniques are presented to make this more approachable to a typical lab.
Read MoreJoin our mailing list to receive the latest talks/research related to Hardware and Security.
Your subscription indicates that you have agreed to the terms and conditions of hardwear.io! Read our privacy policy
Recent Comments