This talk shows that timing attacks may be applicable wherever (time-leaking) security features are implemented on existing network-connected devices with slower clocks. This may be the case for ICS devices and critical infrastructures environments.Read More
A look at techniques used to visually extract the contents of ROM embedded in micro-controllers and SoC devices.Read More
Keynote talk by Christopher Tarnovsky on Exposing The Deep-Secure Elements Of Smartcards at hardwear.io | Hardware Security Conference & Training USA 2019.Read More
Bitfi – You Wouldn’t Steal My Cloins by Andrew Tierney (@cybergibbons) from Pen Test Partners (@PenTestPartners)
Andrew Tierney (@cybergibbons) talked about some of the social media circus, some of the ethics, and explained how the attacks actually worked for Bitfi at hardwear.io – Hardware Security Conference & Training, The Hague, Netherlands 2018.Read More
Z-Shave. Exploiting Z-Wave downgrade attacks by Andrew Tierney (@cybergibbons) from Pen Test Partners (@PenTestPartners)
Speaker presented a critique of the Z-Wave standard, highlighting important differences between marketing and reality, leading to the weakening of security for users of the system.Read More
- Hardwear.io USA 2021 – Grab your ticket!
- Hardware Security Training from the best | Virtual Edition| Hardwear.io Security Training Netherlands 2020
- How to run virtual Conference | Hardwear.io Security
- Hardwear.io at Indian Dutch Cyber Security School 2020
- My First Three Months at Hardwear.io | Andrea Simonca
Subscribe to hardwear.io Media Center
Join our mailing list to receive the latest talks/research related to Hardware and Security.