This talk shows that timing attacks may be applicable wherever (time-leaking) security features are implemented on existing network-connected devices with slower clocks. This may be the case for ICS devices and critical infrastructures environments.Read More
Month: June 2019
A look at techniques used to visually extract the contents of ROM embedded in micro-controllers and SoC devices.Read More
Keynote talk by Christopher Tarnovsky on Exposing The Deep-Secure Elements Of Smartcards at hardwear.io | Hardware Security Conference & Training USA 2019.Read More
Subscribe to hardwear.io Media Center
Join our mailing list to receive the latest talks/research related to Hardware and Security.