Select Page

Category: 2018 Talks

The undercover world of Reverse-Engineering based Integrated Circuit attacks by Olivier Thomas (@reivilo_t) from Texplained (@Texplained_RE)

This talk aims at demonstrating the capabilities of Reverse-Engineering based invasive attacks and its impact on various known attacks. It will show how vulnerabilities can be found in an automated way while some new techniques can be created by taking advantage of a better understanding of the IC even in a black box scenario.

Read More

Who needs IoT security certification? – CXO Panel – Marc Witteman (@Riscure), Gil Bernabeu (@_gilhom_ @GlobalPlatform_), Roberto Avanzi (@DogeMocenigo @Arm), Eric Vétillard (@evetillard @NXP) & Andrew Dellow (@Huawei)

We all are aware of IoT Security incidents happening in the world. In this panel discussion, a group of industry leaders talked about How IoT Security is affecting our lives? and whether IoT Security certification, regulation & framework can minimize security incidents!

Read More

Smart car forensics and Sensor warfare by Gabriel Cirlig (@hookgab) & Stefan Tanase (@stefant) from Ixia (@Ixia_ATI @IXIAcom)

As “smart” is becoming the new standard for everything, malicious threat actors are quick to capitalize on the insecurity of IoT devices. Hackers compromising your network and spying on you is not something new in the world of personal computers, but definitely an emerging threat in the world of personal cars.

Read More

It WISN’t me, Attacking Industrial Wireless Mesh Networks by Erwin Paternotte (@stokedsecurity) & Mattijs van Ommeren (@alcyonsecurity) from Nixu Benelux (@NixuBenelux @NixuTigerTeam)

This presentation will fill this gap by providing the necessary building blocks to perform a more in-depth security analysis of WISN and provide tools to perform practical attacks against these wireless networks in order to verify resistance to real-world attacks.

Read More

The Race to Secure Texas Instruments Graphing Calculators by Brandon Wilson (@brandonlwilson)

In this talk, speaker will provide a technical overview of the history of achieving and maintaining unsigned code execution on the various graphing calculator models Texas Instruments has released over many years, as well as a personal recollection on how the first Flash unlock exploits were created and evolved to keep up with TI’s fixes, how the 512-bit RSA OS signing keys were factored and the legal fallout, and the current challenge to find and utilize new vulnerabilities for the latest models.

Read More

Strategies to Harden and Neutralize UAV Using RF DEW by José Lopes Esteves (@lopessecurity) Co-authored by Emmanuel Cottais (@EmmanuelCottais) & Chaouki Kasmi (@EMHacktivity)

This talk focuses on the technical trials and tribulations faced by the authors during the setup and the realization of IEMI susceptibility tests against common off the shelf UAVs. In order to get a fine grain understanding of the effects of IEMI at both physical and logical levels of the drone, a software instrumentation has been performed, implying a privileged access to the system. Some interesting results will also be provided about the effects observed on the target and discussed regarding their criticality.

Read More

Spreading The Load: Building A Better Hardware Hacking Community by Kate Temkin (@ktemkin)

This keynote address explores examples of significant hardware vulnerabilities discovered by the speaker — touching on the hardware techniques that led to their discovery — and shows how these issues arose not just from failures of hardware design practice, but from shortcomings in the way we treat hardware security as a community.

Read More