Top 10 secure boot mistakes | Jasper van Woudenberg [@jzvw]
This talk presents an overview of all things that can go wrong when developers attempt to implement a chain of trust also called ‘secure boot’.
Read Moreby hardwear.io | Jun 14, 2019 | Hardware Hacking, hardwear.io USA 2019 Talks | 0
This talk presents an overview of all things that can go wrong when developers attempt to implement a chain of trust also called ‘secure boot’.
Read Moreby hardwear.io | Jun 14, 2019 | CXO Panel Discussion, Hardware Hacking, hardwear.io USA 2019 Talks, IoT Security | 0
This is a CXO panel discusssion from hardwear.io | Hardware Security Conference & Training, USA 2019.
Read Moreby hardwear.io | Jun 14, 2019 | Hardware Hacking, hardwear.io USA 2019 Talks, IC Reversing | 0
This talk showcases how hardware offensive security represents a tailored answer to both the developers of secure solutions and the parties willing to extract data from highly protected devices.
Read Moreby hardwear.io | Jun 14, 2019 | Hardware Hacking, hardwear.io USA 2019 Talks | 0
Since the discovery of Spectre & Meltdown, about 7 other speculative execution vulnerabilities have been discovered. These attacks can have a devastating impact. In this talk Raoul focused on the key issue with these attacks, and with Foreshadow/L1TF as a specific example.
Read Moreby hardwear.io | Jun 14, 2019 | Hardware Hacking, hardwear.io USA 2019 Talks, IC Reversing | 0
This talk explored correlating infrared emissions to logic functions. While traditionally prohibitively expensive, relatively low-cost techniques are presented to make this more approachable to a typical lab.
Read Moreby hardwear.io | Jun 14, 2019 | Hardware Hacking, hardwear.io USA 2019 Talks, Keynote | 0
Keynote talk by Christopher Tarnovsky from hardwear.io | Hardware Security Conference & Training 2019, USA.
Read Moreby hardwear.io | Jun 13, 2019 | CXO Panel Discussion, Hardware Hacking, hardwear.io USA 2019 Talks, IoT Security | 0
This is a CXO panel discusssion from hardwear.io | Hardware Security Conference & Training, USA 2019.
Read Moreby hardwear.io | Jun 13, 2019 | Hardware Hacking, hardwear.io USA 2019 Talks, Open Source Hardware | 0
Talk by Dr. Joseph Kiniry from hardwear.io USA 2019.
Read Moreby hardwear.io | Jun 13, 2019 | Hardware Hacking, hardwear.io USA 2019 Talks | 0
Eric Schlaepfer discussed the analysis methods used and the operating principles of the sound card — both of the hardware and the firmware.
Read Moreby hardwear.io | Jun 13, 2019 | Bluetooth Hacking, Hardware Hacking, hardwear.io USA 2019 Talks, IoT Security, Radio Hacking | 0
This talk by Mike Ryan described how to reverse engineer Bluetooth data on a variety of devices including a heart monitor, a padlock, a music listening device, a Bluetooth credit card, and a Bluetooth-controlled skateboard.
Read Moreby hardwear.io | Jun 13, 2019 | Hardware Hacking, hardwear.io USA 2019 Talks, IoT Security | 0
This talk shows that timing attacks may be applicable wherever (time-leaking) security features are implemented on existing network-connected devices with slower clocks. This may be the case for ICS devices and critical infrastructures environments.
Read Moreby hardwear.io | Jun 13, 2019 | Hardware Hacking, hardwear.io USA 2019 Talks | 0
A look at techniques used to visually extract the contents of ROM embedded in micro-controllers and SoC devices.
Read MoreJoin our mailing list to receive the latest talks/research related to Hardware and Security.
Your subscription indicates that you have agreed to the terms and conditions of hardwear.io! Read our privacy policy
Recent Comments