/
|
hardwear.io logo large.png
|
373.6 KB
|
hardwear.io logo.jpg
|
4.7 KB
|
hardwear.io thank you.txt
|
0.8 KB
|
HEADER.md
|
0.4 KB
|
/slides/
|
Advanced-IC-Reverse-Engineering-Techniques-In-Depth-Analysis-of-A-Modern-Smart-Card-by-Olivier-THOMAS.pdf
|
49.4 MB
|
Attack-Methodologies-on-Security-Chips-Marcus-Janke-Peter-Laackmann.pdf
|
8.7 MB
|
Building-Hardware-We-Are-Proud-Of-by-Jon-Callas.pdf
|
567.6 KB
|
ERNW_hardwear.io_2015_living_in_a_fools_wireless-secured_paradise_skiese.pdf
|
2.7 MB
|
got-HW-crypto-slides_hardwear_gunnar-christian.pdf
|
9.4 MB
|
Hacking-Satellite-TV-receivers-Are-those-IoT-devices-secure_-by-Sofiane.pdf
|
4.2 MB
|
Hardware-Hacking-with-the-Beaglebone-B-Hack.pdf
|
3.9 MB
|
hardwear-io-2015-from-cots-to-research-lucian-cojocar-herbert-bos.pdf
|
1.8 MB
|
NSA-Playset-Bridging-the-Airgap-without-Radios-by-Michael-.pdf
|
7.3 MB
|
Slide-hardware_re_for_software_reversers-By-Czarny-Rigo.pdf
|
3.0 MB
|
Telecom-Security-lessons-learned-or-not_-by-Harald-Welte.pdf
|
96.5 KB
|
/video/
|
Javier Speaker Bytes.mp4
|
493.1 KB
|
Jon Callas Speaker Bytes.mp4
|
730.6 KB
|
Olivier Thomas Speaker Bytes.mp4
|
1.1 MB
|
Speaker Byte Joe FitzPatrick.mp4
|
2.5 MB
|
Speaker Byte Michael Leibowitz.mp4
|
1.9 MB
|
/.../hardwear.io 2015 captions/
|
Javier Speaker Bytes.eng.json
|
13.6 KB
|
Javier Speaker Bytes.eng.lrc
|
0.3 KB
|
Javier Speaker Bytes.eng.srt
|
0.4 KB
|
Javier Speaker Bytes.eng.text
|
0.3 KB
|
Javier Speaker Bytes.eng.tsv
|
0.3 KB
|
Javier Speaker Bytes.eng.txt
|
0.3 KB
|
Javier Speaker Bytes.eng.vtt
|
0.4 KB
|
Jon Callas Speaker Bytes.eng.json
|
22.6 KB
|
Jon Callas Speaker Bytes.eng.lrc
|
0.6 KB
|
Jon Callas Speaker Bytes.eng.srt
|
0.7 KB
|
Jon Callas Speaker Bytes.eng.text
|
0.4 KB
|
Jon Callas Speaker Bytes.eng.tsv
|
0.5 KB
|
Jon Callas Speaker Bytes.eng.txt
|
0.6 KB
|
Jon Callas Speaker Bytes.eng.vtt
|
0.6 KB
|
Olivier Thomas Speaker Bytes.eng.json
|
38.0 KB
|
Olivier Thomas Speaker Bytes.eng.lrc
|
1.0 KB
|
Olivier Thomas Speaker Bytes.eng.srt
|
1.1 KB
|
Olivier Thomas Speaker Bytes.eng.text
|
0.7 KB
|
Olivier Thomas Speaker Bytes.eng.tsv
|
0.8 KB
|
Olivier Thomas Speaker Bytes.eng.txt
|
1.0 KB
|
Olivier Thomas Speaker Bytes.eng.vtt
|
1.0 KB
|
Speaker Byte Joe FitzPatrick.eng.json
|
67.0 KB
|
Speaker Byte Joe FitzPatrick.eng.lrc
|
1.7 KB
|
Speaker Byte Joe FitzPatrick.eng.srt
|
1.6 KB
|
Speaker Byte Joe FitzPatrick.eng.text
|
1.3 KB
|
Speaker Byte Joe FitzPatrick.eng.tsv
|
1.5 KB
|
Speaker Byte Joe FitzPatrick.eng.txt
|
1.7 KB
|
Speaker Byte Joe FitzPatrick.eng.vtt
|
1.6 KB
|
Speaker Byte Michael Leibowitz.eng.json
|
34.1 KB
|
Speaker Byte Michael Leibowitz.eng.lrc
|
0.9 KB
|
Speaker Byte Michael Leibowitz.eng.srt
|
0.8 KB
|
Speaker Byte Michael Leibowitz.eng.text
|
0.6 KB
|
Speaker Byte Michael Leibowitz.eng.tsv
|
0.8 KB
|
Speaker Byte Michael Leibowitz.eng.txt
|
0.9 KB
|
Speaker Byte Michael Leibowitz.eng.vtt
|
0.8 KB
|
/slides/
|
hardware-security-conference-hans-de-vries-NCSC.pptx
|
4.1 MB
|
OLD SKEWL HACKING DVB-T Black Button Pivot by Adam Laur.pdf
|
1.7 MB
|
Reverse Engineering vehicles Burpsuite Style by Javier & Ferdi.pptx
|
3.7 MB
|
Self driving cars and not so autonomous security by Nicolas Massaviol.pdf
|
1.1 MB
|
Tower defense for hackers Layered (in-)security for microcontrollers by Milosch.pdf
|
4.0 MB
|
/video/
|
Analyzing vehicle networks with CANToolz by Michael Elizarov.mp4
|
64.3 MB
|
Dropping The MIC Picking up the Keystore by Stefan Kiese.mp4
|
54.3 MB
|
Electromagnetic Harmonic Attack by Patrick Haddad.mp4
|
60.3 MB
|
Hardware Implants for Flashy Lights and Root Shells by Joseph Fitzpatrick.mp4
|
108.8 MB
|
How to fool an ADC by Alexander Bolshev.mp4
|
88.4 MB
|
Keynote by SERGEY BRATUS.mp4
|
55.4 MB
|
Look at devices used to attack ATMs & POS systems by Weston Hecker.mp4
|
57.6 MB
|
OLD SKEWL HACKING - DVB-T Black Button Pivot by Adam Laurie.mp4
|
66.0 MB
|
Reverse Engineering vehicles Burpsuite Style by Javier & Ferdinand.mp4
|
59.5 MB
|
Self driving cars and not so autonomous security by Nicolas Massaviol.mp4
|
71.9 MB
|
Tower defense for hackers - Layered (in-)security for microcontrollers by Milosch.mp4
|
40.8 MB
|
/.../hardwear.io 2016 captions/
|
Analyzing vehicle networks with CANToolz by Michael Elizarov.eng.srt
|
29.9 KB
|
Dropping The MIC Picking up the Keystore by Stefan Kiese.eng.srt
|
43.6 KB
|
Electromagnetic Harmonic Attack by Patrick Haddad.eng.json
|
1.6 MB
|
Electromagnetic Harmonic Attack by Patrick Haddad.eng.lrc
|
44.1 KB
|
Electromagnetic Harmonic Attack by Patrick Haddad.eng.srt
|
36.7 KB
|
Electromagnetic Harmonic Attack by Patrick Haddad.eng.text
|
27.0 KB
|
Electromagnetic Harmonic Attack by Patrick Haddad.eng.tsv
|
37.0 KB
|
Electromagnetic Harmonic Attack by Patrick Haddad.eng.txt
|
44.8 KB
|
Electromagnetic Harmonic Attack by Patrick Haddad.eng.vtt
|
33.9 KB
|
Hardware Implants for Flashy Lights and Root Shells by Joseph Fitzpatrick.eng.srt
|
103.6 KB
|
How to fool an ADC by Alexander Bolshev.eng.json
|
1.8 MB
|
How to fool an ADC by Alexander Bolshev.eng.lrc
|
50.6 KB
|
How to fool an ADC by Alexander Bolshev.eng.srt
|
45.8 KB
|
How to fool an ADC by Alexander Bolshev.eng.text
|
30.0 KB
|
How to fool an ADC by Alexander Bolshev.eng.tsv
|
42.1 KB
|
How to fool an ADC by Alexander Bolshev.eng.txt
|
51.4 KB
|
How to fool an ADC by Alexander Bolshev.eng.vtt
|
41.2 KB
|
Keynote by SERGEY BRATUS.eng.srt
|
69.9 KB
|
Look at devices used to attack ATMs & POS systems by Weston Hecker.eng.srt
|
128.6 KB
|
OLD SKEWL HACKING - DVB-T Black Button Pivot by Adam Laurie.eng.srt
|
64.3 KB
|
Reverse Engineering vehicles Burpsuite Style by Javier & Ferdinand.eng.srt
|
75.0 KB
|
Self driving cars and not so autonomous security by Nicolas Massaviol.eng.srt
|
86.9 KB
|
Tower defense for hackers - Layered (in-)security for microcontrollers by Milosch.eng.json
|
1.4 MB
|
Tower defense for hackers - Layered (in-)security for microcontrollers by Milosch.eng.lrc
|
34.4 KB
|
Tower defense for hackers - Layered (in-)security for microcontrollers by Milosch.eng.srt
|
36.7 KB
|
Tower defense for hackers - Layered (in-)security for microcontrollers by Milosch.eng.text
|
26.9 KB
|
Tower defense for hackers - Layered (in-)security for microcontrollers by Milosch.eng.tsv
|
31.2 KB
|
Tower defense for hackers - Layered (in-)security for microcontrollers by Milosch.eng.txt
|
34.7 KB
|
Tower defense for hackers - Layered (in-)security for microcontrollers by Milosch.eng.vtt
|
33.9 KB
|
/slides/
|
black-box-debugging-embedded-systems.pptx
|
7.3 MB
|
flip-a-bit-grab-a-key-hardwear-io-2017-v1-1.pdf
|
1.4 MB
|
fpga-re-azonenberg.pptx
|
4.2 MB
|
hardware-root-of-mistrust-hardwear.pdf
|
11.4 MB
|
hardwear-gras-razavi.pdf
|
6.5 MB
|
hardwear-io-den-haag-20170922-christof-paar.pdf
|
2.4 MB
|
hardwear-io-lopesEsteves-kasmi-cottais-ghost-in-your-transmitter-phycovert-channels-detection.pdf
|
1.8 MB
|
hardwear-patrick-paumen.pptx
|
11.6 MB
|
hio.pdf
|
1.4 MB
|
hwio-keynote.pdf
|
6.7 MB
|
metasploit-hw-bridge-hardwear.io.pdf
|
891.3 KB
|
metasploit-HW-bridge-hardwear.io-craig-smith.pdf
|
891.3 KB
|
niek-cristofaro-escalating-privileges-in-linux-using-fi-presentation-hardwareio.pdf
|
4.7 MB
|
rtos-exploit-mitigation-blues-hardwear-io.pptx
|
44.6 MB
|
slides-craig-ramsay.pdf
|
5.2 MB
|
/video/
|
Challenging Real World Targets by Dr Sergei Skorobogatov.mp4
|
74.6 MB
|
CXO Panel - UnDependable Dependencies In Safety Critical Infrastructure.mp4
|
51.2 MB
|
CXO Panel - Who Owns Your Car by Dr.Ana Magazinius, Abe Chen, Craig Smith.mp4
|
68.8 MB
|
Flip A Bit, Grab A Key - Symbolic Execution Edition by Jasper van Woudenberg.mp4
|
55.6 MB
|
Ghost in your Transmitter by Emmanuel Cottais, Chaouki Kasmi, José Lopes Esteves.mp4
|
53.6 MB
|
Hack Your Body, One Implant At A Time by Patrick Paumen.mp4
|
73.5 MB
|
Hardware Root Of Mistrust by Joe FitzPatrick.mp4
|
67.4 MB
|
Hardware Trojans And The Internet Of Things by Dr. Christof Paar.mp4
|
63.9 MB
|
KERNELFAULT by Niek Timmers & Cristofaro Mune.mp4
|
61.0 MB
|
Latest Metasploit Hardware Bridge Techniques by Craig Smith.mp4
|
68.6 MB
|
Reverse Engineering Of Programmable Logic Bitstreams by Andrew Zonenberg.mp4
|
41.5 MB
|
Shaking trust in hardware by Ben Gras&Kaveh Razavi.mp4
|
66.0 MB
|
TEMPEST Attacks Against AES by Craig Ramsay.mp4
|
45.1 MB
|
The RTOS Exploit Mitigation Blues by Jos Wetzels.mp4
|
59.7 MB
|
To Guess Wrong Is Expensive by Sarani Bhattacharya.mp4
|
43.8 MB
|
Wall Game Q&A.mp4
|
1.4 MB
|
/.../hardwear.io 2017 captions/
|
Challenging Real World Targets by Dr Sergei Skorobogatov.eng.json
|
1.8 MB
|
Challenging Real World Targets by Dr Sergei Skorobogatov.eng.lrc
|
46.6 KB
|
Challenging Real World Targets by Dr Sergei Skorobogatov.eng.srt
|
45.8 KB
|
Challenging Real World Targets by Dr Sergei Skorobogatov.eng.text
|
34.4 KB
|
Challenging Real World Targets by Dr Sergei Skorobogatov.eng.tsv
|
41.6 KB
|
Challenging Real World Targets by Dr Sergei Skorobogatov.eng.txt
|
47.0 KB
|
Challenging Real World Targets by Dr Sergei Skorobogatov.eng.vtt
|
42.5 KB
|
CXO Panel - UnDependable Dependencies In Safety Critical Infrastructure.eng.json
|
1.5 MB
|
CXO Panel - UnDependable Dependencies In Safety Critical Infrastructure.eng.lrc
|
40.4 KB
|
CXO Panel - UnDependable Dependencies In Safety Critical Infrastructure.eng.srt
|
37.2 KB
|
CXO Panel - UnDependable Dependencies In Safety Critical Infrastructure.eng.text
|
25.6 KB
|
CXO Panel - UnDependable Dependencies In Safety Critical Infrastructure.eng.tsv
|
34.1 KB
|
CXO Panel - UnDependable Dependencies In Safety Critical Infrastructure.eng.txt
|
41.0 KB
|
CXO Panel - UnDependable Dependencies In Safety Critical Infrastructure.eng.vtt
|
33.9 KB
|
CXO Panel - Who Owns Your Car by Dr.Ana Magazinius, Abe Chen, Craig Smith.eng.json
|
2.0 MB
|
CXO Panel - Who Owns Your Car by Dr.Ana Magazinius, Abe Chen, Craig Smith.eng.lrc
|
49.3 KB
|
CXO Panel - Who Owns Your Car by Dr.Ana Magazinius, Abe Chen, Craig Smith.eng.srt
|
55.6 KB
|
CXO Panel - Who Owns Your Car by Dr.Ana Magazinius, Abe Chen, Craig Smith.eng.text
|
35.9 KB
|
CXO Panel - Who Owns Your Car by Dr.Ana Magazinius, Abe Chen, Craig Smith.eng.tsv
|
43.7 KB
|
CXO Panel - Who Owns Your Car by Dr.Ana Magazinius, Abe Chen, Craig Smith.eng.txt
|
49.8 KB
|
CXO Panel - Who Owns Your Car by Dr.Ana Magazinius, Abe Chen, Craig Smith.eng.vtt
|
50.0 KB
|
Flip A Bit, Grab A Key - Symbolic Execution Edition by Jasper van Woudenberg.eng.json
|
2.0 MB
|
Flip A Bit, Grab A Key - Symbolic Execution Edition by Jasper van Woudenberg.eng.lrc
|
51.9 KB
|
Flip A Bit, Grab A Key - Symbolic Execution Edition by Jasper van Woudenberg.eng.srt
|
53.5 KB
|
Flip A Bit, Grab A Key - Symbolic Execution Edition by Jasper van Woudenberg.eng.text
|
34.7 KB
|
Flip A Bit, Grab A Key - Symbolic Execution Edition by Jasper van Woudenberg.eng.tsv
|
44.7 KB
|
Flip A Bit, Grab A Key - Symbolic Execution Edition by Jasper van Woudenberg.eng.txt
|
52.5 KB
|
Flip A Bit, Grab A Key - Symbolic Execution Edition by Jasper van Woudenberg.eng.vtt
|
48.1 KB
|
Ghost in your Transmitter by Emmanuel Cottais, Chaouki Kasmi, José Lopes Esteves.eng.json
|
1.1 MB
|
Ghost in your Transmitter by Emmanuel Cottais, Chaouki Kasmi, José Lopes Esteves.eng.lrc
|
29.2 KB
|
Ghost in your Transmitter by Emmanuel Cottais, Chaouki Kasmi, José Lopes Esteves.eng.srt
|
28.4 KB
|
Ghost in your Transmitter by Emmanuel Cottais, Chaouki Kasmi, José Lopes Esteves.eng.text
|
21.2 KB
|
Ghost in your Transmitter by Emmanuel Cottais, Chaouki Kasmi, José Lopes Esteves.eng.tsv
|
25.8 KB
|
Ghost in your Transmitter by Emmanuel Cottais, Chaouki Kasmi, José Lopes Esteves.eng.txt
|
29.5 KB
|
Ghost in your Transmitter by Emmanuel Cottais, Chaouki Kasmi, José Lopes Esteves.eng.vtt
|
26.4 KB
|
Hack Your Body, One Implant At A Time by Patrick Paumen.eng.json
|
1.4 MB
|
Hack Your Body, One Implant At A Time by Patrick Paumen.eng.lrc
|
33.7 KB
|
Hack Your Body, One Implant At A Time by Patrick Paumen.eng.srt
|
39.1 KB
|
Hack Your Body, One Implant At A Time by Patrick Paumen.eng.text
|
25.1 KB
|
Hack Your Body, One Implant At A Time by Patrick Paumen.eng.tsv
|
30.1 KB
|
Hack Your Body, One Implant At A Time by Patrick Paumen.eng.txt
|
34.0 KB
|
Hack Your Body, One Implant At A Time by Patrick Paumen.eng.vtt
|
35.2 KB
|
Hardware Root Of Mistrust by Joe FitzPatrick.eng.json
|
2.4 MB
|
Hardware Root Of Mistrust by Joe FitzPatrick.eng.lrc
|
63.4 KB
|
Hardware Root Of Mistrust by Joe FitzPatrick.eng.srt
|
64.4 KB
|
Hardware Root Of Mistrust by Joe FitzPatrick.eng.text
|
42.2 KB
|
Hardware Root Of Mistrust by Joe FitzPatrick.eng.tsv
|
54.5 KB
|
Hardware Root Of Mistrust by Joe FitzPatrick.eng.txt
|
64.2 KB
|
Hardware Root Of Mistrust by Joe FitzPatrick.eng.vtt
|
58.0 KB
|
Hardware Trojans And The Internet Of Things by Dr. Christof Paar.eng.json
|
3.3 MB
|
Hardware Trojans And The Internet Of Things by Dr. Christof Paar.eng.lrc
|
87.2 KB
|
Hardware Trojans And The Internet Of Things by Dr. Christof Paar.eng.srt
|
80.7 KB
|
Hardware Trojans And The Internet Of Things by Dr. Christof Paar.eng.text
|
54.3 KB
|
Hardware Trojans And The Internet Of Things by Dr. Christof Paar.eng.tsv
|
73.7 KB
|
Hardware Trojans And The Internet Of Things by Dr. Christof Paar.eng.txt
|
88.4 KB
|
Hardware Trojans And The Internet Of Things by Dr. Christof Paar.eng.vtt
|
73.0 KB
|
KERNELFAULT by Niek Timmers & Cristofaro Mune.eng.json
|
2.5 MB
|
KERNELFAULT by Niek Timmers & Cristofaro Mune.eng.lrc
|
62.9 KB
|
KERNELFAULT by Niek Timmers & Cristofaro Mune.eng.srt
|
68.0 KB
|
KERNELFAULT by Niek Timmers & Cristofaro Mune.eng.text
|
47.8 KB
|
KERNELFAULT by Niek Timmers & Cristofaro Mune.eng.tsv
|
56.7 KB
|
KERNELFAULT by Niek Timmers & Cristofaro Mune.eng.txt
|
63.5 KB
|
KERNELFAULT by Niek Timmers & Cristofaro Mune.eng.vtt
|
62.2 KB
|
Latest Metasploit Hardware Bridge Techniques by Craig Smith.eng.json
|
3.0 MB
|
Latest Metasploit Hardware Bridge Techniques by Craig Smith.eng.lrc
|
83.7 KB
|
Latest Metasploit Hardware Bridge Techniques by Craig Smith.eng.srt
|
72.9 KB
|
Latest Metasploit Hardware Bridge Techniques by Craig Smith.eng.text
|
49.3 KB
|
Latest Metasploit Hardware Bridge Techniques by Craig Smith.eng.tsv
|
69.5 KB
|
Latest Metasploit Hardware Bridge Techniques by Craig Smith.eng.txt
|
85.0 KB
|
Latest Metasploit Hardware Bridge Techniques by Craig Smith.eng.vtt
|
65.9 KB
|
Reverse Engineering Of Programmable Logic Bitstreams by Andrew Zonenberg.eng.json
|
2.0 MB
|
Reverse Engineering Of Programmable Logic Bitstreams by Andrew Zonenberg.eng.lrc
|
49.4 KB
|
Reverse Engineering Of Programmable Logic Bitstreams by Andrew Zonenberg.eng.srt
|
54.4 KB
|
Reverse Engineering Of Programmable Logic Bitstreams by Andrew Zonenberg.eng.text
|
38.7 KB
|
Reverse Engineering Of Programmable Logic Bitstreams by Andrew Zonenberg.eng.tsv
|
44.9 KB
|
Reverse Engineering Of Programmable Logic Bitstreams by Andrew Zonenberg.eng.txt
|
49.8 KB
|
Reverse Engineering Of Programmable Logic Bitstreams by Andrew Zonenberg.eng.vtt
|
49.9 KB
|
Shaking trust in hardware by Ben Gras&Kaveh Razavi.eng.json
|
2.4 MB
|
Shaking trust in hardware by Ben Gras&Kaveh Razavi.eng.lrc
|
63.0 KB
|
Shaking trust in hardware by Ben Gras&Kaveh Razavi.eng.srt
|
56.7 KB
|
Shaking trust in hardware by Ben Gras&Kaveh Razavi.eng.text
|
41.6 KB
|
Shaking trust in hardware by Ben Gras&Kaveh Razavi.eng.tsv
|
54.1 KB
|
Shaking trust in hardware by Ben Gras&Kaveh Razavi.eng.txt
|
63.8 KB
|
Shaking trust in hardware by Ben Gras&Kaveh Razavi.eng.vtt
|
52.3 KB
|
TEMPEST Attacks Against AES by Craig Ramsay.eng.json
|
1.8 MB
|
TEMPEST Attacks Against AES by Craig Ramsay.eng.lrc
|
50.7 KB
|
TEMPEST Attacks Against AES by Craig Ramsay.eng.srt
|
43.5 KB
|
TEMPEST Attacks Against AES by Craig Ramsay.eng.text
|
31.0 KB
|
TEMPEST Attacks Against AES by Craig Ramsay.eng.tsv
|
42.6 KB
|
TEMPEST Attacks Against AES by Craig Ramsay.eng.txt
|
51.5 KB
|
TEMPEST Attacks Against AES by Craig Ramsay.eng.vtt
|
39.9 KB
|
The RTOS Exploit Mitigation Blues by Jos Wetzels.eng.json
|
2.2 MB
|
The RTOS Exploit Mitigation Blues by Jos Wetzels.eng.lrc
|
57.9 KB
|
The RTOS Exploit Mitigation Blues by Jos Wetzels.eng.srt
|
59.6 KB
|
The RTOS Exploit Mitigation Blues by Jos Wetzels.eng.text
|
45.5 KB
|
The RTOS Exploit Mitigation Blues by Jos Wetzels.eng.tsv
|
52.7 KB
|
The RTOS Exploit Mitigation Blues by Jos Wetzels.eng.txt
|
58.4 KB
|
The RTOS Exploit Mitigation Blues by Jos Wetzels.eng.vtt
|
55.6 KB
|
To Guess Wrong Is Expensive by Sarani Bhattacharya.eng.json
|
1.3 MB
|
To Guess Wrong Is Expensive by Sarani Bhattacharya.eng.lrc
|
32.8 KB
|
To Guess Wrong Is Expensive by Sarani Bhattacharya.eng.srt
|
33.8 KB
|
To Guess Wrong Is Expensive by Sarani Bhattacharya.eng.text
|
25.6 KB
|
To Guess Wrong Is Expensive by Sarani Bhattacharya.eng.tsv
|
29.8 KB
|
To Guess Wrong Is Expensive by Sarani Bhattacharya.eng.txt
|
33.1 KB
|
To Guess Wrong Is Expensive by Sarani Bhattacharya.eng.vtt
|
31.5 KB
|
Wall Game Q&A.eng.json
|
0.0 KB
|
Wall Game Q&A.eng.lrc
|
0.0 KB
|
Wall Game Q&A.eng.srt
|
0.0 KB
|
Wall Game Q&A.eng.text
|
0.0 KB
|
Wall Game Q&A.eng.tsv
|
0.0 KB
|
Wall Game Q&A.eng.txt
|
0.0 KB
|
Wall Game Q&A.eng.vtt
|
0.0 KB
|
/slides/
|
2018_keynote_sharing_the_load_kate_temkin.pdf
|
1.5 MB
|
ble-security essentials.pdf
|
9.5 MB
|
Car-forensics_Gabriel-Stefan.pptx
|
9.3 MB
|
It-WISNt-me-attacking-industrial-wireless-mesh.pdf
|
2.0 MB
|
STRATEGIES-TO-HARDEN-AND-NEUTRALIZE-UAV-USING-RF-DEW-BY-JOSÉ-LOPES-ESTEVES-@LOPESSECURITY-at-hardwear.io-2018.pdf
|
1.6 MB
|
The-Race-to-Secure-Texas-Instruments-Graphing-Calculators-by-Brandon-Wilson-at-hardwear.io-2018.pptx
|
14.4 MB
|
There-Goes-Your-PIN-Exploiting-Smartphone-Sensor-Fusion-Under-Single-and-Cross-User-Setting-by-David-Berend.pptx
|
2.1 MB
|
tlbleed-hardwear-io-2018-Ben-Kaveh.pdf
|
16.5 MB
|
/video/
|
Attacking industrial Wireless Mesh Networks by E. Paternotte And M. v Ommeren.mp4
|
46.8 MB
|
Black Box Is Dead. Long Live Black Box by V. Kononovich And A. Stennikov.mp4
|
32.5 MB
|
Fault Injection On Automotive Diagnosis Protocols by Santiago Cordoba.mp4
|
36.8 MB
|
Hardwear.io 2018 The Race To Secure Texas Instruments Graphing Calculators by Brandon Wilson.mp4
|
53.4 MB
|
Product Security For IoT - Mission Impossible by Alex Poschmann.mp4
|
38.8 MB
|
Reverse- Engineering Based Integrated Circuit Attacks by O. Thomas.mp4
|
64.8 MB
|
Smart Car Forensics And Sensor Warfare by Gabriel Cirlig And Stefan Tanase.mp4
|
26.9 MB
|
Spreading The Load - Building A Better Hardware Hacking Community by Kate Temkin.mp4
|
56.6 MB
|
Strategies To Harden And Neutralize UAV Using RF DEW by José Lopes Esteves.mp4
|
41.8 MB
|
The Future Of Hardware Security Is In Open Standards - Helena Handschuh.mp4
|
53.6 MB
|
There Goes Your PIN - Exploiting Smartphone Sensor Fusion by David Berend.mp4
|
18.6 MB
|
TLBleed - When Protecting Your CPU Caches Is Not Enough by B. Gras And K. Razavi.mp4
|
43.5 MB
|
Who Needs IoT Security Certification - CXO Panel - hardwear.io 2018.mp4
|
63.7 MB
|
Z-Shave. Exploiting Z-Wave Downgrade Attacks by Andrew Tierney.mp4
|
38.5 MB
|
/.../hardwear.io 2018 captions/
|
Attacking industrial Wireless Mesh Networks by E. Paternotte And M. v Ommeren.eng.srt
|
100.2 KB
|
Black Box Is Dead. Long Live Black Box by V. Kononovich And A. Stennikov.eng.srt
|
73.3 KB
|
Fault Injection On Automotive Diagnosis Protocols by Santiago Cordoba.eng.srt
|
91.7 KB
|
Hardwear.io 2018 The Race To Secure Texas Instruments Graphing Calculators by Brandon Wilson.eng.srt
|
209.6 KB
|
Product Security For IoT - Mission Impossible by Alex Poschmann.eng.srt
|
114.5 KB
|
Reverse- Engineering Based Integrated Circuit Attacks by O. Thomas.eng.srt
|
161.9 KB
|
Smart Car Forensics And Sensor Warfare by Gabriel Cirlig And Stefan Tanase.eng.srt
|
84.8 KB
|
Spreading The Load - Building A Better Hardware Hacking Community by Kate Temkin.eng.srt
|
169.4 KB
|
Strategies To Harden And Neutralize UAV Using RF DEW by José Lopes Esteves.eng.srt
|
92.7 KB
|
The Future Of Hardware Security Is In Open Standards - Helena Handschuh.eng.srt
|
160.7 KB
|
There Goes Your PIN - Exploiting Smartphone Sensor Fusion by David Berend.eng.srt
|
42.2 KB
|
TLBleed - When Protecting Your CPU Caches Is Not Enough by B. Gras And K. Razavi.eng.srt
|
142.7 KB
|
Who Needs IoT Security Certification - CXO Panel - hardwear.io 2018.eng.srt
|
132.1 KB
|
Z-Shave. Exploiting Z-Wave Downgrade Attacks by Andrew Tierney.eng.srt
|
122.2 KB
|
/hardwear.io 2019 Netherlands/
|
CXO PANEL Security Certifications for IoT Devices.mp4
|
88.7 MB
|
Day-1 with a TTIG-868 - Brian Butterly.mp4
|
63.4 MB
|
Electric vehicle CAN man-in-the-middling - Emile Nijssenv.mp4
|
48.4 MB
|
Exposing device features on 4G & 5G networks - Altaf Shaik & Ravishankar Borgaonkar - NL 2019.mp4
|
70.4 MB
|
Hacking pre-obd car for fun and horsepower - Gyver Ferrand.mp4
|
48.2 MB
|
Hardware security evaluation of Intel MAX 10 FPGAs - Dr. Sergei Skorobogatov.mp4
|
78.8 MB
|
hardwear.io Netherlands 2019.m3u
|
1.3 KB
|
IC Surgery getting to the heart of the problem with the smallest scalpel - John Walker - Keynote.mp4
|
66.5 MB
|
It's easier to break than to patch a stealthy DoS attack on CAN - Stefano Zanero & Stefano Longari.mp4
|
74.5 MB
|
Poking the S in SD cards - Nicolas Oberli.mp4
|
63.9 MB
|
RIDLed with CPU bugs - Alyssa Milburn & Stephan van Schaik.mp4
|
50.4 MB
|
Roots of Trust and Attestation - Trammell Hudson - Keynote.mp4
|
49.4 MB
|
Sniffle A low-cost sniffer for Bluetooth 5 - Sultan Qasim Khan.mp4
|
70.4 MB
|
Tamper Proofing Commodity Hardware & other Applications - Christian Zenger & Lars Steinschulte.mp4
|
55.8 MB
|
When hardware attacks scale - Marc Witteman.mp4
|
60.4 MB
|
/.../hardwear.io 2019 Netherlands captions/
|
CXO PANEL Security Certifications for IoT Devices.eng.srt
|
80.4 KB
|
Day-1 with a TTIG-868 - Brian Butterly.eng.srt
|
63.9 KB
|
Electric vehicle CAN man-in-the-middling - Emile Nijssenv.eng.srt
|
67.8 KB
|
Exposing device features on 4G & 5G networks - Altaf Shaik & Ravishankar Borgaonkar - NL 2019.eng.srt
|
110.9 KB
|
Hacking pre-obd car for fun and horsepower - Gyver Ferrand.eng.srt
|
32.5 KB
|
Hardware security evaluation of Intel MAX 10 FPGAs - Dr. Sergei Skorobogatov.eng.srt
|
86.8 KB
|
IC Surgery getting to the heart of the problem with the smallest scalpel - John Walker - Keynote.eng.srt
|
68.4 KB
|
It's easier to break than to patch a stealthy DoS attack on CAN - Stefano Zanero & Stefano Longari.eng.srt
|
71.3 KB
|
Poking the S in SD cards - Nicolas Oberli.eng.srt
|
65.7 KB
|
RIDLed with CPU bugs - Alyssa Milburn & Stephan van Schaik.eng.srt
|
95.3 KB
|
Roots of Trust and Attestation - Trammell Hudson - Keynote.eng.srt
|
57.1 KB
|
Sniffle A low-cost sniffer for Bluetooth 5 - Sultan Qasim Khan.eng.srt
|
66.2 KB
|
Tamper Proofing Commodity Hardware & other Applications - Christian Zenger & Lars Steinschulte.eng.json
|
1.6 MB
|
Tamper Proofing Commodity Hardware & other Applications - Christian Zenger & Lars Steinschulte.eng.lrc
|
40.1 KB
|
Tamper Proofing Commodity Hardware & other Applications - Christian Zenger & Lars Steinschulte.eng.srt
|
43.9 KB
|
Tamper Proofing Commodity Hardware & other Applications - Christian Zenger & Lars Steinschulte.eng.text
|
30.4 KB
|
Tamper Proofing Commodity Hardware & other Applications - Christian Zenger & Lars Steinschulte.eng.tsv
|
36.1 KB
|
Tamper Proofing Commodity Hardware & other Applications - Christian Zenger & Lars Steinschulte.eng.txt
|
40.5 KB
|
Tamper Proofing Commodity Hardware & other Applications - Christian Zenger & Lars Steinschulte.eng.vtt
|
40.1 KB
|
When hardware attacks scale - Marc Witteman.eng.json
|
1.7 MB
|
When hardware attacks scale - Marc Witteman.eng.lrc
|
42.7 KB
|
When hardware attacks scale - Marc Witteman.eng.srt
|
48.5 KB
|
When hardware attacks scale - Marc Witteman.eng.text
|
31.9 KB
|
When hardware attacks scale - Marc Witteman.eng.tsv
|
38.2 KB
|
When hardware attacks scale - Marc Witteman.eng.txt
|
43.1 KB
|
When hardware attacks scale - Marc Witteman.eng.vtt
|
43.8 KB
|
/slides/
|
Bluetooth-Hacking-Mike Ryan-hardwear-io-usa-2019.pdf
|
14.5 MB
|
control_requests_Kate-Temkin-hardwear-io-usa-2019.pdf
|
1.3 MB
|
front_matter_Kate-Temkin-hardwear-io-usa-2019.pdf
|
906.1 KB
|
IntegratedCircuitOffensiveSecurity-Olivier-Thomas-hardwear-io-usa-2019.pdf
|
83.3 MB
|
post-quantum-cryptography-michael-hamburg-hardwear-io-usa-2019.pptx
|
12.1 MB
|
Sound-Blaster-Clone-Eric-hardwear-io-usa-2019.pdf
|
20.7 MB
|
Speculative-execution-vulnerabilities-From-a-Simple-Oversight-to-a-Technological-Nightmare-Raoul-Strackx-hardwear-io-usa-2019.pdf
|
5.4 MB
|
Top-10-Secure-Boot-Mistakes-v1.1-hardwear-io-usa-2019-jasper-van-woudenberg.pdf
|
1.5 MB
|
using-symbolic-execution-for-IoT-bug-hunting-grzegorz-wypych-hardwear-io-usa-2019.pdf
|
4.6 MB
|
/video/
|
Bits From The Matrix Optical ROM Extraction Chris Gerlinsky.mp4
|
51.9 MB
|
Bluetooth Hacking Tools And Techniques Mike Ryan.mp4
|
56.1 MB
|
Cloning A Sound Card Eric Schlaepfer.mp4
|
17.4 MB
|
Exposing The Deep-Secure Elements Of Smartcards Christopher Tarnovsky.mp4
|
51.5 MB
|
Hardwear.io Darth Vader badge soldering (4x speed).mp4
|
11.9 MB
|
Integrated Circuit Offensive Security Olivier Thomas from Texplained.mp4
|
62.6 MB
|
Low-Cost IC Emission Reverse Engineering John McMaster.mp4
|
43.3 MB
|
Nationally Critical Infrastructure needs Secure Hardware Dr. Joseph Kiniry.mp4
|
57.5 MB
|
OverTime Remote Timing Attacks Against IoT Devices Cristofaro Mune.mp4
|
55.2 MB
|
Speculative execution vulnerabilities Raoul Strackx.mp4
|
48.9 MB
|
Top 10 Secure Boot Mistakes Jasper Van Woudenberg.mp4
|
65.0 MB
|
/.../hardwear.io 2019 USA captions/
|
Bits From The Matrix Optical ROM Extraction Chris Gerlinsky.eng.srt
|
84.5 KB
|
Bluetooth Hacking Tools And Techniques Mike Ryan.eng.srt
|
102.7 KB
|
Cloning A Sound Card Eric Schlaepfer.eng.srt
|
81.3 KB
|
Exposing The Deep-Secure Elements Of Smartcards Christopher Tarnovsky.eng.srt
|
73.7 KB
|
Hardwear.io Darth Vader badge soldering (4x speed).eng.srt
|
0.4 KB
|
Integrated Circuit Offensive Security Olivier Thomas from Texplained.eng.srt
|
77.1 KB
|
Low-Cost IC Emission Reverse Engineering John McMaster.eng.srt
|
78.1 KB
|
Nationally Critical Infrastructure needs Secure Hardware Dr. Joseph Kiniry.eng.srt
|
110.8 KB
|
OverTime Remote Timing Attacks Against IoT Devices Cristofaro Mune.eng.srt
|
85.3 KB
|
Speculative execution vulnerabilities Raoul Strackx.eng.json
|
2.1 MB
|
Speculative execution vulnerabilities Raoul Strackx.eng.lrc
|
51.6 KB
|
Speculative execution vulnerabilities Raoul Strackx.eng.srt
|
58.5 KB
|
Speculative execution vulnerabilities Raoul Strackx.eng.text
|
39.9 KB
|
Speculative execution vulnerabilities Raoul Strackx.eng.tsv
|
46.8 KB
|
Speculative execution vulnerabilities Raoul Strackx.eng.txt
|
52.0 KB
|
Speculative execution vulnerabilities Raoul Strackx.eng.vtt
|
53.2 KB
|
Top 10 Secure Boot Mistakes Jasper Van Woudenberg.eng.srt
|
73.3 KB
|
/hardwear.io 2020 Virtual/
|
A Full Break of Bitstream Encryption of Xilinx 7-Series FPGAs - Maik Ender.mp4
|
34.3 MB
|
Breaking Deployed Crypto, The Side-channel Analyst's Way - Daniel Moghimi.mp4
|
27.6 MB
|
Capturing Mask ROMs - John McMaster.mp4
|
46.9 MB
|
Defeating TLS client authentication using fault attack - Nicolas & Sylvain.mp4
|
34.8 MB
|
From Bluetooth Standard to Standard Compliant 0-days - Daniele Antonioli.mp4
|
30.6 MB
|
Hints from Hardware Security for solving real-world challenges - Dr Sergei.mp4
|
23.6 MB
|
Practical protection from firmware attacks in hardware supply chain - Sophia d'Antoine.mp4
|
36.6 MB
|
Quarantine Chill Mix.mp4
|
35.2 MB
|
Reverse engineering of neural network architectures via side-channel - Stjepan Picek.mp4
|
45.0 MB
|
Wall Challenge Questions Answers.mp4
|
3.4 MB
|
/.../hardwear.io 2020 Virtual captions/
|
A Full Break of Bitstream Encryption of Xilinx 7-Series FPGAs - Maik Ender.eng.json
|
1.4 MB
|
A Full Break of Bitstream Encryption of Xilinx 7-Series FPGAs - Maik Ender.eng.lrc
|
32.9 KB
|
A Full Break of Bitstream Encryption of Xilinx 7-Series FPGAs - Maik Ender.eng.srt
|
38.8 KB
|
A Full Break of Bitstream Encryption of Xilinx 7-Series FPGAs - Maik Ender.eng.text
|
25.5 KB
|
A Full Break of Bitstream Encryption of Xilinx 7-Series FPGAs - Maik Ender.eng.tsv
|
29.8 KB
|
A Full Break of Bitstream Encryption of Xilinx 7-Series FPGAs - Maik Ender.eng.txt
|
33.2 KB
|
A Full Break of Bitstream Encryption of Xilinx 7-Series FPGAs - Maik Ender.eng.vtt
|
35.1 KB
|
Breaking Deployed Crypto, The Side-channel Analyst's Way - Daniel Moghimi.eng.json
|
1.4 MB
|
Breaking Deployed Crypto, The Side-channel Analyst's Way - Daniel Moghimi.eng.lrc
|
35.4 KB
|
Breaking Deployed Crypto, The Side-channel Analyst's Way - Daniel Moghimi.eng.srt
|
37.4 KB
|
Breaking Deployed Crypto, The Side-channel Analyst's Way - Daniel Moghimi.eng.text
|
27.7 KB
|
Breaking Deployed Crypto, The Side-channel Analyst's Way - Daniel Moghimi.eng.tsv
|
32.1 KB
|
Breaking Deployed Crypto, The Side-channel Analyst's Way - Daniel Moghimi.eng.txt
|
35.7 KB
|
Breaking Deployed Crypto, The Side-channel Analyst's Way - Daniel Moghimi.eng.vtt
|
34.7 KB
|
Capturing Mask ROMs - John McMaster.eng.json
|
2.2 MB
|
Capturing Mask ROMs - John McMaster.eng.lrc
|
58.6 KB
|
Capturing Mask ROMs - John McMaster.eng.srt
|
56.1 KB
|
Capturing Mask ROMs - John McMaster.eng.text
|
39.5 KB
|
Capturing Mask ROMs - John McMaster.eng.tsv
|
50.6 KB
|
Capturing Mask ROMs - John McMaster.eng.txt
|
59.3 KB
|
Capturing Mask ROMs - John McMaster.eng.vtt
|
51.3 KB
|
Defeating TLS client authentication using fault attack - Nicolas & Sylvain.eng.json
|
1.2 MB
|
Defeating TLS client authentication using fault attack - Nicolas & Sylvain.eng.lrc
|
28.7 KB
|
Defeating TLS client authentication using fault attack - Nicolas & Sylvain.eng.srt
|
34.2 KB
|
Defeating TLS client authentication using fault attack - Nicolas & Sylvain.eng.text
|
24.0 KB
|
Defeating TLS client authentication using fault attack - Nicolas & Sylvain.eng.tsv
|
26.6 KB
|
Defeating TLS client authentication using fault attack - Nicolas & Sylvain.eng.txt
|
28.8 KB
|
Defeating TLS client authentication using fault attack - Nicolas & Sylvain.eng.vtt
|
31.4 KB
|
From Bluetooth Standard to Standard Compliant 0-days - Daniele Antonioli.eng.json
|
1.3 MB
|
From Bluetooth Standard to Standard Compliant 0-days - Daniele Antonioli.eng.lrc
|
33.5 KB
|
From Bluetooth Standard to Standard Compliant 0-days - Daniele Antonioli.eng.srt
|
35.9 KB
|
From Bluetooth Standard to Standard Compliant 0-days - Daniele Antonioli.eng.text
|
26.1 KB
|
From Bluetooth Standard to Standard Compliant 0-days - Daniele Antonioli.eng.tsv
|
30.3 KB
|
From Bluetooth Standard to Standard Compliant 0-days - Daniele Antonioli.eng.txt
|
33.8 KB
|
From Bluetooth Standard to Standard Compliant 0-days - Daniele Antonioli.eng.vtt
|
33.1 KB
|
Hints from Hardware Security for solving real-world challenges - Dr Sergei.eng.json
|
1.1 MB
|
Hints from Hardware Security for solving real-world challenges - Dr Sergei.eng.lrc
|
28.7 KB
|
Hints from Hardware Security for solving real-world challenges - Dr Sergei.eng.srt
|
29.4 KB
|
Hints from Hardware Security for solving real-world challenges - Dr Sergei.eng.text
|
22.3 KB
|
Hints from Hardware Security for solving real-world challenges - Dr Sergei.eng.tsv
|
25.9 KB
|
Hints from Hardware Security for solving real-world challenges - Dr Sergei.eng.txt
|
28.9 KB
|
Hints from Hardware Security for solving real-world challenges - Dr Sergei.eng.vtt
|
27.4 KB
|
Practical protection from firmware attacks in hardware supply chain - Sophia d'Antoine.eng.json
|
1.8 MB
|
Practical protection from firmware attacks in hardware supply chain - Sophia d'Antoine.eng.lrc
|
44.7 KB
|
Practical protection from firmware attacks in hardware supply chain - Sophia d'Antoine.eng.srt
|
48.1 KB
|
Practical protection from firmware attacks in hardware supply chain - Sophia d'Antoine.eng.text
|
34.5 KB
|
Practical protection from firmware attacks in hardware supply chain - Sophia d'Antoine.eng.tsv
|
40.4 KB
|
Practical protection from firmware attacks in hardware supply chain - Sophia d'Antoine.eng.txt
|
45.0 KB
|
Practical protection from firmware attacks in hardware supply chain - Sophia d'Antoine.eng.vtt
|
44.3 KB
|
Quarantine Chill Mix.eng.json
|
101.8 KB
|
Quarantine Chill Mix.eng.lrc
|
2.6 KB
|
Quarantine Chill Mix.eng.srt
|
3.6 KB
|
Quarantine Chill Mix.eng.text
|
1.6 KB
|
Quarantine Chill Mix.eng.tsv
|
2.2 KB
|
Quarantine Chill Mix.eng.txt
|
2.7 KB
|
Quarantine Chill Mix.eng.vtt
|
3.1 KB
|
Reverse engineering of neural network architectures via side-channel - Stjepan Picek.eng.json
|
1.6 MB
|
Reverse engineering of neural network architectures via side-channel - Stjepan Picek.eng.lrc
|
39.3 KB
|
Reverse engineering of neural network architectures via side-channel - Stjepan Picek.eng.srt
|
46.1 KB
|
Reverse engineering of neural network architectures via side-channel - Stjepan Picek.eng.text
|
30.6 KB
|
Reverse engineering of neural network architectures via side-channel - Stjepan Picek.eng.tsv
|
35.6 KB
|
Reverse engineering of neural network architectures via side-channel - Stjepan Picek.eng.txt
|
39.6 KB
|
Reverse engineering of neural network architectures via side-channel - Stjepan Picek.eng.vtt
|
41.8 KB
|
Wall Challenge Questions Answers.eng.json
|
4.8 KB
|
Wall Challenge Questions Answers.eng.lrc
|
0.1 KB
|
Wall Challenge Questions Answers.eng.srt
|
0.2 KB
|
Wall Challenge Questions Answers.eng.text
|
0.1 KB
|
Wall Challenge Questions Answers.eng.tsv
|
0.1 KB
|
Wall Challenge Questions Answers.eng.txt
|
0.1 KB
|
Wall Challenge Questions Answers.eng.vtt
|
0.2 KB
|
/hardwear.io 2020 Webinars/
|
A decade of Machine Learning in Profiled Side-channel Analysis - Stjepan Picek.mp4
|
44.5 MB
|
Analyzing AMD SEV's Remote Attestation - Robert Buhren.mp4
|
33.5 MB
|
Analyzing Embedded Systems The Smart Way - Henrik Ferdinand Noelscher.mp4
|
27.4 MB
|
Beyond Root Custom Firmware for Embedded Mobile Chipsets - Christopher Wade.mp4
|
50.4 MB
|
Bluetooth 5 Hacking by Sultan Qasim Khan.mp4
|
19.2 MB
|
Bringing light into the Black Box - Step by step black-box reverse engineering of ECUs.mp4
|
63.3 MB
|
Building a Repairable Future - Kyle Wiens.mp4
|
50.2 MB
|
Building Whiteboxes attacks and defenses - Matthieu Daumas.mp4
|
49.3 MB
|
DL-based Denoising of TEMPEST Images for Efficient OCR - Santiago & Juan.mp4
|
63.1 MB
|
Embedded Physical Attacks by Kostas Papagiannopoulos.mp4
|
15.2 MB
|
Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares.mp4
|
52.1 MB
|
Hardware Acceleration on Reconfigurable Platform for Efficient Cryptography Design - Elif Bilge Kavun.mp4
|
34.2 MB
|
How efiXplorer helping to solve challenges in reverse engineering of UEFI firmware - Alex Matrosov.mp4
|
41.7 MB
|
Hunting UEFI Firmware Implants by Alex Matrosov.mp4
|
34.8 MB
|
Machine Learning & Side-channel Attacks by Stjepan Picek.mp4
|
6.7 MB
|
Reverse engineering raw firmware tool to get you started - Guillaume Heilles.mp4
|
61.5 MB
|
Reverse Engineering UDS and firmware on the Tesla Model S Battery Management System - Patrick Kiley.mp4
|
44.9 MB
|
RF shadow games - Sébastien Dudek.mp4
|
57.0 MB
|
RISC-V How an open ISA benefits hardware security - Drew Fustini.mp4
|
35.6 MB
|
Securing CAN bus augmenting the CAN protocol - Dr. Ken Tindell.mp4
|
34.7 MB
|
Securing keys in leading-edge chips with Physical Unclonable Functions - Geert-Jan Schrijen.mp4
|
34.8 MB
|
Side-channel analysis on SoC devices a Graal's quest - Hugues Thiebeauld.mp4
|
43.0 MB
|
Sinking U-Boots with Depthcharge Effective Exploitation of Boot-Time Security Debt - Jon Szymaniak.mp4
|
58.1 MB
|
The current landscape of global IoT security regulations - Brad Ree.mp4
|
29.3 MB
|
Why Fault Injection is attacker's weapon of choice in IoT era - Marc Witteman.mp4
|
34.5 MB
|
/.../hardwear.io 2020 Webinars captions/
|
A decade of Machine Learning in Profiled Side-channel Analysis - Stjepan Picek.eng.srt
|
81.3 KB
|
Analyzing AMD SEV's Remote Attestation - Robert Buhren.eng.json
|
1.4 MB
|
Analyzing AMD SEV's Remote Attestation - Robert Buhren.eng.lrc
|
35.0 KB
|
Analyzing AMD SEV's Remote Attestation - Robert Buhren.eng.srt
|
39.0 KB
|
Analyzing AMD SEV's Remote Attestation - Robert Buhren.eng.text
|
27.2 KB
|
Analyzing AMD SEV's Remote Attestation - Robert Buhren.eng.tsv
|
31.7 KB
|
Analyzing AMD SEV's Remote Attestation - Robert Buhren.eng.txt
|
35.3 KB
|
Analyzing AMD SEV's Remote Attestation - Robert Buhren.eng.vtt
|
35.7 KB
|
Analyzing Embedded Systems The Smart Way - Henrik Ferdinand Noelscher.eng.srt
|
62.3 KB
|
Beyond Root Custom Firmware for Embedded Mobile Chipsets - Christopher Wade.eng.json
|
2.7 MB
|
Beyond Root Custom Firmware for Embedded Mobile Chipsets - Christopher Wade.eng.lrc
|
67.4 KB
|
Beyond Root Custom Firmware for Embedded Mobile Chipsets - Christopher Wade.eng.srt
|
68.0 KB
|
Beyond Root Custom Firmware for Embedded Mobile Chipsets - Christopher Wade.eng.text
|
52.7 KB
|
Beyond Root Custom Firmware for Embedded Mobile Chipsets - Christopher Wade.eng.tsv
|
61.4 KB
|
Beyond Root Custom Firmware for Embedded Mobile Chipsets - Christopher Wade.eng.txt
|
68.0 KB
|
Beyond Root Custom Firmware for Embedded Mobile Chipsets - Christopher Wade.eng.vtt
|
63.6 KB
|
Bluetooth 5 Hacking by Sultan Qasim Khan.eng.srt
|
46.9 KB
|
Bringing light into the Black Box - Step by step black-box reverse engineering of ECUs.eng.srt
|
21.2 KB
|
Building a Repairable Future - Kyle Wiens.eng.srt
|
72.1 KB
|
Building Whiteboxes attacks and defenses - Matthieu Daumas.eng.srt
|
83.7 KB
|
DL-based Denoising of TEMPEST Images for Efficient OCR - Santiago & Juan.eng.srt
|
72.6 KB
|
Embedded Physical Attacks by Kostas Papagiannopoulos.eng.srt
|
31.9 KB
|
Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares.eng.srt
|
81.6 KB
|
Hardware Acceleration on Reconfigurable Platform for Efficient Cryptography Design - Elif Bilge Kavun.eng.srt
|
69.2 KB
|
How efiXplorer helping to solve challenges in reverse engineering of UEFI firmware - Alex Matrosov.eng.srt
|
96.0 KB
|
Hunting UEFI Firmware Implants by Alex Matrosov.eng.srt
|
77.7 KB
|
Machine Learning & Side-channel Attacks by Stjepan Picek.eng.srt
|
22.2 KB
|
Reverse engineering raw firmware tool to get you started - Guillaume Heilles.eng.srt
|
81.9 KB
|
Reverse Engineering UDS and firmware on the Tesla Model S Battery Management System - Patrick Kiley.eng.srt
|
80.0 KB
|
RF shadow games - Sébastien Dudek.eng.srt
|
74.1 KB
|
RISC-V How an open ISA benefits hardware security - Drew Fustini.eng.srt
|
73.5 KB
|
Securing CAN bus augmenting the CAN protocol - Dr. Ken Tindell.eng.srt
|
90.3 KB
|
Securing keys in leading-edge chips with Physical Unclonable Functions - Geert-Jan Schrijen.eng.srt
|
46.9 KB
|
Side-channel analysis on SoC devices a Graal's quest - Hugues Thiebeauld.eng.json
|
1.6 MB
|
Side-channel analysis on SoC devices a Graal's quest - Hugues Thiebeauld.eng.lrc
|
37.1 KB
|
Side-channel analysis on SoC devices a Graal's quest - Hugues Thiebeauld.eng.srt
|
44.9 KB
|
Side-channel analysis on SoC devices a Graal's quest - Hugues Thiebeauld.eng.text
|
28.7 KB
|
Side-channel analysis on SoC devices a Graal's quest - Hugues Thiebeauld.eng.tsv
|
33.6 KB
|
Side-channel analysis on SoC devices a Graal's quest - Hugues Thiebeauld.eng.txt
|
37.4 KB
|
Side-channel analysis on SoC devices a Graal's quest - Hugues Thiebeauld.eng.vtt
|
40.3 KB
|
Sinking U-Boots with Depthcharge Effective Exploitation of Boot-Time Security Debt - Jon Szymaniak.eng.json
|
2.4 MB
|
Sinking U-Boots with Depthcharge Effective Exploitation of Boot-Time Security Debt - Jon Szymaniak.eng.lrc
|
59.7 KB
|
Sinking U-Boots with Depthcharge Effective Exploitation of Boot-Time Security Debt - Jon Szymaniak.eng.srt
|
62.5 KB
|
Sinking U-Boots with Depthcharge Effective Exploitation of Boot-Time Security Debt - Jon Szymaniak.eng.text
|
46.7 KB
|
Sinking U-Boots with Depthcharge Effective Exploitation of Boot-Time Security Debt - Jon Szymaniak.eng.tsv
|
54.4 KB
|
Sinking U-Boots with Depthcharge Effective Exploitation of Boot-Time Security Debt - Jon Szymaniak.eng.txt
|
60.2 KB
|
Sinking U-Boots with Depthcharge Effective Exploitation of Boot-Time Security Debt - Jon Szymaniak.eng.vtt
|
58.0 KB
|
The current landscape of global IoT security regulations - Brad Ree.eng.srt
|
44.6 KB
|
Why Fault Injection is attacker's weapon of choice in IoT era - Marc Witteman.eng.srt
|
42.5 KB
|
/hardwear.io 2021 Netherlands/
|
A Side Journey To Titan by Victor Lomné.mp4
|
70.4 MB
|
An Analysis Of Machine Clears For Transient Execution Attacks by Enrico & Hany.mp4
|
60.8 MB
|
Automated Vulnerability Hunting In SMM Using Brick by Assaf & Itai.mp4
|
62.2 MB
|
Blackboxing Diebold-Nixdorf ATMs by Vladimir Kononovich.mp4
|
26.2 MB
|
BlueMirror Defeating Authentication In Bluetooth Protocols by Tristan & Jose.mp4
|
68.5 MB
|
Breaking The Security Barrier Of A B.Braun Infusion Pump by Douglas & Philippe.mp4
|
61.0 MB
|
Can We Build Secure Open Hardware Roots Of Trust (Panel) by Trammell & Fredrik.mp4
|
57.0 MB
|
Closing Note and Prizes by Hardwear.io.mp4
|
13.6 MB
|
Divide & Conquer Revisited FI As A SW EXP Primitive by Rafael and Federico.mp4
|
76.0 MB
|
EEPROM It Will All End In Tears by Philippe Teuwen & Christian Herrmann.mp4
|
83.0 MB
|
Flippin‘ Fake Flops For Fun, Fame And Fortune by Jasper Van Woudenberg.mp4
|
73.2 MB
|
Opening Note - Antriksh Shah.mp4
|
8.7 MB
|
Over The Air-Tag Shenanigans With A Keyfinder by Jiska , Fabian And Thomas.mp4
|
59.6 MB
|
Supply Chain Security (and Attacks) panel by Cristofaro, David and Jan.mp4
|
92.7 MB
|
Teardown And Feasibility Study Of IronKey by Sergei Skorobogatov.mp4
|
63.8 MB
|
When Threat Models Meet by Herbert Bos.mp4
|
86.3 MB
|
/.../hardwear.io 2021 Netherlands captions/
|
A Side Journey To Titan by Victor Lomné.eng.json
|
1.6 MB
|
A Side Journey To Titan by Victor Lomné.eng.lrc
|
38.4 KB
|
A Side Journey To Titan by Victor Lomné.eng.srt
|
43.0 KB
|
A Side Journey To Titan by Victor Lomné.eng.text
|
29.7 KB
|
A Side Journey To Titan by Victor Lomné.eng.tsv
|
34.8 KB
|
A Side Journey To Titan by Victor Lomné.eng.txt
|
38.7 KB
|
A Side Journey To Titan by Victor Lomné.eng.vtt
|
39.2 KB
|
An Analysis Of Machine Clears For Transient Execution Attacks by Enrico & Hany.eng.srt
|
78.3 KB
|
Automated Vulnerability Hunting In SMM Using Brick by Assaf & Itai.eng.srt
|
76.6 KB
|
Blackboxing Diebold-Nixdorf ATMs by Vladimir Kononovich.eng.srt
|
42.3 KB
|
BlueMirror Defeating Authentication In Bluetooth Protocols by Tristan & Jose.eng.srt
|
73.8 KB
|
Breaking The Security Barrier Of A B.Braun Infusion Pump by Douglas & Philippe.eng.srt
|
97.0 KB
|
Can We Build Secure Open Hardware Roots Of Trust (Panel) by Trammell & Fredrik.eng.srt
|
69.0 KB
|
Closing Note and Prizes by Hardwear.io.eng.srt
|
20.1 KB
|
Divide & Conquer Revisited FI As A SW EXP Primitive by Rafael and Federico.eng.srt
|
102.0 KB
|
EEPROM It Will All End In Tears by Philippe Teuwen & Christian Herrmann.eng.srt
|
88.1 KB
|
Flippin‘ Fake Flops For Fun, Fame And Fortune by Jasper Van Woudenberg.eng.srt
|
88.2 KB
|
Opening Note - Antriksh Shah.eng.srt
|
13.2 KB
|
Over The Air-Tag Shenanigans With A Keyfinder by Jiska , Fabian And Thomas.eng.srt
|
74.2 KB
|
Supply Chain Security (and Attacks) panel by Cristofaro, David and Jan.eng.srt
|
97.6 KB
|
Teardown And Feasibility Study Of IronKey by Sergei Skorobogatov.eng.srt
|
81.8 KB
|
When Threat Models Meet by Herbert Bos.eng.srt
|
113.9 KB
|
/hardwear.io 2021 USA/
|
Boost your hardware reversing with glscopeclient - Andrew Zonenberg - hardwear.io USA Conference 21.mp4
|
56.7 MB
|
Building CANtact Pro An Open Source CAN Bus Tool - Eric Evenchick hardwear.io USA Conference 2021.mp4
|
16.4 MB
|
Call for Papers - Pro Tips by Cristofaro Mune - hardwear.io 2021.mp4
|
5.0 MB
|
Enabling dynamic analysis of Legacy Embedded Systems in full emulated environment - Lun Yen.mp4
|
17.9 MB
|
Extracting programmable logic with photons - John McMaster.mp4
|
28.6 MB
|
Interacting with - OS hardware from user space - Jiska Classen.mp4
|
24.0 MB
|
Proving the efficacy of software countermeasures for fault injection - Joshua Beaker - hardwear.io.mp4
|
20.0 MB
|
Secure Builds for Secure Software - Chris Frantz.mp4
|
20.5 MB
|
Silicon Security - Panel Talk.mp4
|
45.8 MB
|
The Cheapskate Revolution Hardware Attacks from Millions to Tens of Dollars - Colin O'Flynn.mp4
|
62.8 MB
|
The Mooltipass Open Source Hardware Authentication Ecosystem - Mathieu Stephan - hardwear.io USA Con.mp4
|
19.9 MB
|
/.../hardwear.io 2021 USA captions/
|
Boost your hardware reversing with glscopeclient - Andrew Zonenberg - hardwear.io USA Conference 21.eng.srt
|
136.6 KB
|
Building CANtact Pro An Open Source CAN Bus Tool - Eric Evenchick hardwear.io USA Conference 2021.eng.srt
|
61.7 KB
|
Call for Papers - Pro Tips by Cristofaro Mune - hardwear.io 2021.eng.srt
|
10.3 KB
|
Enabling dynamic analysis of Legacy Embedded Systems in full emulated environment - Lun Yen.eng.srt
|
45.9 KB
|
Extracting programmable logic with photons - John McMaster.eng.srt
|
90.2 KB
|
Interacting with - OS hardware from user space - Jiska Classen.eng.json
|
1.2 MB
|
Interacting with - OS hardware from user space - Jiska Classen.eng.lrc
|
29.2 KB
|
Interacting with - OS hardware from user space - Jiska Classen.eng.srt
|
33.5 KB
|
Interacting with - OS hardware from user space - Jiska Classen.eng.text
|
22.6 KB
|
Interacting with - OS hardware from user space - Jiska Classen.eng.tsv
|
26.4 KB
|
Interacting with - OS hardware from user space - Jiska Classen.eng.txt
|
29.4 KB
|
Interacting with - OS hardware from user space - Jiska Classen.eng.vtt
|
30.5 KB
|
Proving the efficacy of software countermeasures for fault injection - Joshua Beaker - hardwear.io.eng.srt
|
72.0 KB
|
Secure Builds for Secure Software - Chris Frantz.eng.srt
|
73.3 KB
|
Silicon Security - Panel Talk.eng.srt
|
94.2 KB
|
The Cheapskate Revolution Hardware Attacks from Millions to Tens of Dollars - Colin O'Flynn.eng.srt
|
77.0 KB
|
The Mooltipass Open Source Hardware Authentication Ecosystem - Mathieu Stephan - hardwear.io USA Con.eng.srt
|
67.8 KB
|
/hardwear.io 2022 Netherlands/
|
An Overview Of The Security Of Some Hardware FIDO(2) Tokens by Victor Lomne.mp4
|
52.6 MB
|
Assessing The Security Of An SMM Supervisor by Ilja Van Sprundel.mp4
|
59.1 MB
|
Blackbox Fuzzing With Side Channels by Sergei Volokitin.mp4
|
31.7 MB
|
Bluetooth LE Link Layer Relay Attacks by Sultan Qasim Khan.mp4
|
67.1 MB
|
Bypass NXP LPC-Family Debug Check with Voltage Fault Injection by Waleed AlZamil and Bandar Alharbi.mp4
|
25.5 MB
|
Hardware Attacks Against SM4 In Practice by Sylvain Pelissier and Nicolas Oberli.mp4
|
37.4 MB
|
How To Tame Your Robot by Jiska Classen & Fabian Freyer.mp4
|
48.7 MB
|
Keynote - Reverse Engineering Is Good For Soul by Travis Goodspeed.mp4
|
59.0 MB
|
Panel How Can We Make Hardware Bug Bounties Better.mp4
|
87.2 MB
|
Practical Invasive Attacks, How Hardware is Hacked For Compatible Product Creation by Thomas Olivier.mp4
|
50.6 MB
|
Rethinking TEEs In The Age Of Reconfigurable Computing by Sérgio Pereira & Dr. Sandro Pinto.mp4
|
56.0 MB
|
Security Pitfall Of Hand-geometry recognition-based Access Control Systems by Luca Bongiorni.mp4
|
58.8 MB
|
Using A Magic Wand To Break The IPhone's Last Security Barrier by Tihmstar.mp4
|
49.3 MB
|
Using EMC Equipment As A Side Channel Acquisition Technique by Nicolas Oberli & Benjamin Vernoux.mp4
|
50.4 MB
|
/.../hardwear.io 2022 Netherlands captions/
|
An Overview Of The Security Of Some Hardware FIDO(2) Tokens by Victor Lomne.eng.srt
|
74.4 KB
|
Assessing The Security Of An SMM Supervisor by Ilja Van Sprundel.eng.srt
|
85.9 KB
|
Blackbox Fuzzing With Side Channels by Sergei Volokitin.eng.srt
|
53.8 KB
|
Bluetooth LE Link Layer Relay Attacks by Sultan Qasim Khan.eng.srt
|
64.8 KB
|
Bypass NXP LPC-Family Debug Check with Voltage Fault Injection by Waleed AlZamil and Bandar Alharbi.eng.srt
|
26.1 KB
|
Hardware Attacks Against SM4 In Practice by Sylvain Pelissier and Nicolas Oberli.eng.srt
|
51.8 KB
|
How To Tame Your Robot by Jiska Classen & Fabian Freyer.eng.srt
|
69.2 KB
|
Keynote - Reverse Engineering Is Good For Soul by Travis Goodspeed.eng.srt
|
85.6 KB
|
Panel How Can We Make Hardware Bug Bounties Better.eng.srt
|
97.3 KB
|
Practical Invasive Attacks, How Hardware is Hacked For Compatible Product Creation by Thomas Olivier.eng.srt
|
68.9 KB
|
Rethinking TEEs In The Age Of Reconfigurable Computing by Sérgio Pereira & Dr. Sandro Pinto.eng.srt
|
66.2 KB
|
Security Pitfall Of Hand-geometry recognition-based Access Control Systems by Luca Bongiorni.eng.srt
|
76.5 KB
|
Using A Magic Wand To Break The IPhone's Last Security Barrier by Tihmstar.eng.srt
|
63.2 KB
|
Using EMC Equipment As A Side Channel Acquisition Technique by Nicolas Oberli & Benjamin Vernoux.eng.srt
|
56.2 KB
|
/hardwear.io 2022 USA/
|
Armed To Boot A Novel Enhancement To Arm's Secure Boot Chain by Derek & Ryan.mp4
|
29.9 MB
|
bd-jb Blu-ray Disc Java Sandbox Escape by Andy Nguyen.mp4
|
30.0 MB
|
Breaking A Recent SoC’s Hardware AES Accelerator Using Body Biasing Injection by Karim M. Abdellatif.mp4
|
28.1 MB
|
Breaking SoC Security By Glitching OTP Data Transfers by Cristofaro Mune.mp4
|
48.7 MB
|
Exploiting AMBA AXI Protocol For DoS Attacks Of Shared Resources - Francesco Restuccia - hardwear.io.mp4
|
53.6 MB
|
Grinding Tractors To A Halt Growing Pains In Agricultural HardwareSecurity by Sick Codes hardwear.io.mp4
|
31.0 MB
|
Keynote - Adventures Of Wallet Hacking by Joe Grand.mp4
|
76.2 MB
|
Leveraging Electromagnetic Emanations For IoT Malware Classification by Damien Marion, Pham, Annelie.mp4
|
48.5 MB
|
Optimization And Amplification Of Cache Side Channel Signals by David Kaplan.mp4
|
29.0 MB
|
Perimeter Breached Hacking An Access Control System by Steve Povolny & Sam Quinn.mp4
|
55.1 MB
|
Physical Side Channel Attacks On PCs by Daniel Genkin & Roei Schuster.mp4
|
74.2 MB
|
Self-labeling Electronic Shelf Labels by Steffen Robertz.mp4
|
44.6 MB
|
Unwanted Features Finding & Exploiting An In ROM Buffer Overflow On The LPC55S69 by Laura Abbott.mp4
|
52.0 MB
|
/.../hardwear.io 2022 USA captions/
|
Armed To Boot A Novel Enhancement To Arm's Secure Boot Chain by Derek & Ryan.eng.srt
|
49.4 KB
|
bd-jb Blu-ray Disc Java Sandbox Escape by Andy Nguyen.eng.srt
|
54.4 KB
|
Breaking A Recent SoC’s Hardware AES Accelerator Using Body Biasing Injection by Karim M. Abdellatif.eng.srt
|
48.0 KB
|
Breaking SoC Security By Glitching OTP Data Transfers by Cristofaro Mune.eng.srt
|
87.3 KB
|
Exploiting AMBA AXI Protocol For DoS Attacks Of Shared Resources - Francesco Restuccia - hardwear.io.eng.srt
|
84.8 KB
|
Grinding Tractors To A Halt Growing Pains In Agricultural HardwareSecurity by Sick Codes hardwear.io.eng.srt
|
68.8 KB
|
Keynote - Adventures Of Wallet Hacking by Joe Grand.eng.srt
|
98.2 KB
|
Leveraging Electromagnetic Emanations For IoT Malware Classification by Damien Marion, Pham, Annelie.eng.srt
|
49.2 KB
|
Optimization And Amplification Of Cache Side Channel Signals by David Kaplan.eng.srt
|
50.4 KB
|
Perimeter Breached Hacking An Access Control System by Steve Povolny & Sam Quinn.eng.srt
|
90.0 KB
|
Physical Side Channel Attacks On PCs by Daniel Genkin & Roei Schuster.eng.srt
|
77.2 KB
|
Self-labeling Electronic Shelf Labels by Steffen Robertz.eng.srt
|
80.9 KB
|
Unwanted Features Finding & Exploiting An In ROM Buffer Overflow On The LPC55S69 by Laura Abbott.eng.srt
|
82.6 KB
|
/hardwear.io 2022 Webinars/
|
Apple vs EMA Electromagnetic Side Channel Attacks on Apple CoreCrypto - Gregor Haas.mp4
|
47.2 MB
|
Applying Zero Trust Principles to building a Secure RISC-V System - Suresh Sugumar.mp4
|
44.1 MB
|
Can you park a car in a classroom - Phillippe Azalbert.mp4
|
40.3 MB
|
CPU Fuzzing for Discovering Hardware caused Information Leakage Michael.mp4
|
30.8 MB
|
Cyber-physical system security Exploiting the physics of sensors to undermine AI-based decisions.mp4
|
49.7 MB
|
Deep Learning-based Side-channel Analysis Challenges & Perspectives - Stjepan.mp4
|
30.3 MB
|
Disarming TrustZone with TEE Privilege Reduction - David Cerdeira & Sandro Pinto.mp4
|
27.5 MB
|
Knockin' on MediaTek aDSP’s Door - Slava Makkaveev.mp4
|
25.6 MB
|
MoonBounce Internals of the 3rd publicly known UEFI firmware implant - Mark Lechtik.mp4
|
30.1 MB
|
PP0117 Secure Sub-System in System-on-Chip (3S IN SOC) Protection Profile Overview.mp4
|
24.8 MB
|
The AMD Branch (Mis)predictor New Types & Methods of Straight-Line Speculation(SLS) Vulnerabilities.mp4
|
25.2 MB
|
/.../hardwear.io 2022 Webinars captions/
|
Apple vs EMA Electromagnetic Side Channel Attacks on Apple CoreCrypto - Gregor Haas.eng.srt
|
79.5 KB
|
Applying Zero Trust Principles to building a Secure RISC-V System - Suresh Sugumar.eng.srt
|
87.8 KB
|
Can you park a car in a classroom - Phillippe Azalbert.eng.srt
|
69.6 KB
|
CPU Fuzzing for Discovering Hardware caused Information Leakage Michael.eng.srt
|
78.6 KB
|
Cyber-physical system security Exploiting the physics of sensors to undermine AI-based decisions.eng.srt
|
76.8 KB
|
Deep Learning-based Side-channel Analysis Challenges & Perspectives - Stjepan.eng.srt
|
72.0 KB
|
Disarming TrustZone with TEE Privilege Reduction - David Cerdeira & Sandro Pinto.eng.srt
|
71.0 KB
|
Knockin' on MediaTek aDSP’s Door - Slava Makkaveev.eng.srt
|
48.1 KB
|
MoonBounce Internals of the 3rd publicly known UEFI firmware implant - Mark Lechtik.eng.srt
|
69.7 KB
|
PP0117 Secure Sub-System in System-on-Chip (3S IN SOC) Protection Profile Overview.eng.srt
|
52.4 KB
|
The AMD Branch (Mis)predictor New Types & Methods of Straight-Line Speculation(SLS) Vulnerabilities.eng.srt
|
65.3 KB
|
/hardwear.io 2023 USA/
|
Affordable EMFI Attacks Against Modern IoT Chips by Davide Toldo.mp4
|
46.0 MB
|
Back To The Future With Platform Security by Enrique Nissim, Joseph Tartaro and Krzysztof Okupski.mp4
|
58.9 MB
|
Benchmarking The Static Power Vulnerability Of Four CMOS Generations by Thorben Moos.mp4
|
54.5 MB
|
BreakMi Reversing, Exploiting & Fixing Fitness Tracking Ecosystems by M. Casagrande & D. Antonioli.mp4
|
51.5 MB
|
Cryo-Mechanical RAM Content Extraction A DIY Cold Boot Robot For A Thousand Bucks by Ang Cui.mp4
|
50.8 MB
|
Exploring chip decaping techniques for silicon die inspection and reverse engineering.mp4
|
2.5 MB
|
How To Hack Shannon Baseband (from A Phone) by Natalie Silvanovich - hardwear.mp4
|
46.3 MB
|
Inside Apple's Lightning JTAGging The IPhone For Fuzzing And Profit by Thomas Roth.mp4
|
36.2 MB
|
Keynote - The Microarchitectures That I Saw And The Ones That I Hope To One Day See by Rodrigo Branco.mp4
|
97.4 MB
|
Next-Gen Exploitation Exploring The PS5 Security Landscape by Specter.mp4
|
32.0 MB
|
Red Team Vs. Blue Team by Endres Puschner & Steffen Becker.mp4
|
30.4 MB
|
Securing The Unseen Vulnerability Research In Confidential Computing by Josh Eads and Cfir Cohen.mp4
|
63.6 MB
|
The Misuse Of Secure Components In Hardware Wallets by Michael Mouchous & Karim Abdellatif.mp4
|
48.6 MB
|
Un-fare Advantage - Hacking The MBTA CharlieCard From 2008 To Present by Bobby Rauch.mp4
|
43.9 MB
|
/.../hardwear.io 2023 USA captions/
|
Affordable EMFI Attacks Against Modern IoT Chips by Davide Toldo.eng.srt
|
45.7 KB
|
Back To The Future With Platform Security by Enrique Nissim, Joseph Tartaro and Krzysztof Okupski.eng.srt
|
84.6 KB
|
Benchmarking The Static Power Vulnerability Of Four CMOS Generations by Thorben Moos.eng.srt
|
74.1 KB
|
BreakMi Reversing, Exploiting & Fixing Fitness Tracking Ecosystems by M. Casagrande & D. Antonioli.eng.srt
|
72.3 KB
|
Cryo-Mechanical RAM Content Extraction A DIY Cold Boot Robot For A Thousand Bucks by Ang Cui.eng.srt
|
67.7 KB
|
Exploring chip decaping techniques for silicon die inspection and reverse engineering.eng.srt
|
2.0 KB
|
How To Hack Shannon Baseband (from A Phone) by Natalie Silvanovich - hardwear.eng.srt
|
76.7 KB
|
Inside Apple's Lightning JTAGging The IPhone For Fuzzing And Profit by Thomas Roth.eng.srt
|
60.5 KB
|
Keynote - The Microarchitectures That I Saw And The Ones That I Hope To One Day See by Rodrigo Branco.eng.srt
|
106.2 KB
|
Next-Gen Exploitation Exploring The PS5 Security Landscape by Specter.eng.srt
|
64.6 KB
|
Red Team Vs. Blue Team by Endres Puschner & Steffen Becker.eng.srt
|
44.2 KB
|
Securing The Unseen Vulnerability Research In Confidential Computing by Josh Eads and Cfir Cohen.eng.srt
|
100.8 KB
|
The Misuse Of Secure Components In Hardware Wallets by Michael Mouchous & Karim Abdellatif.eng.srt
|
52.9 KB
|
Un-fare Advantage - Hacking The MBTA CharlieCard From 2008 To Present by Bobby Rauch.eng.srt
|
78.2 KB
|
/hardwear.io 2024 USA/
|
After-Movie.mp4
|
12.8 MB
|
BarraCUDA GPUs Do Leak DNN Weights - Peter Horvath.mp4
|
31.2 MB
|
Breaking Into Chips By Reading The Datasheet - Mark Omo and James Rowley.mp4
|
43.1 MB
|
Building A Silicon Analysis Toolkit - Hash Salehi.mp4
|
56.2 MB
|
Exposing Critical Threats In Millions Of Connected Devices - Alexander - Sergey.mp4
|
42.2 MB
|
Integrating AI With Retro HardwareA Commodore 64 LLM Module - Konrad & Marek.mp4
|
57.5 MB
|
LeapFrog The Rowhammer Instruction Skip Attack - Andrew, Caner and Berk.mp4
|
43.8 MB
|
My Car, My Keys Obtaining CAN Bus SecOC Signing Keys - Willem & Greg.mp4
|
52.2 MB
|
Panel A New Root Of Trust Changing Computing With TEE.mp4
|
81.2 MB
|
Panel The Right To Secure - What, Who, How And Why.mp4
|
74.0 MB
|
Secrets Of Simos18 REng The Secure Boot Mechanism Of An ECU - Brian Ledbetter.mp4
|
55.1 MB
|
SRAM Data Remanence In SoCs Covert Storage And Exfiltration Risks In TEE.mp4
|
42.6 MB
|
State-of-the-Art Anti-Counterfeiting Attacks And Countermeasures - Scott Best.mp4
|
76.3 MB
|
TPM 2.0 Attestable Firmware Recovering Trust After Firmware Flaws.mp4
|
29.7 MB
|
TPMs & The Linux Kernel Unlocking A Better Path To Hardware Security - Ignat.mp4
|
48.3 MB
|
Trimmed Welcome Note John McMaster.mp4
|
16.4 MB
|
Who Monitors The Monitors Hacking The Monitor Control Command Set - Eugene Lim.mp4
|
36.5 MB
|
/.../hardwear.io 2024 USA captions/
|
After-Movie.eng.json
|
4.1 KB
|
After-Movie.eng.lrc
|
0.1 KB
|
After-Movie.eng.srt
|
0.2 KB
|
After-Movie.eng.text
|
0.1 KB
|
After-Movie.eng.tsv
|
0.1 KB
|
After-Movie.eng.txt
|
0.1 KB
|
After-Movie.eng.vtt
|
0.1 KB
|
BarraCUDA GPUs Do Leak DNN Weights - Peter Horvath.eng.srt
|
39.4 KB
|
Breaking Into Chips By Reading The Datasheet - Mark Omo and James Rowley.eng.srt
|
65.0 KB
|
Building A Silicon Analysis Toolkit - Hash Salehi.eng.srt
|
76.4 KB
|
Exposing Critical Threats In Millions Of Connected Devices - Alexander - Sergey.eng.srt
|
69.4 KB
|
Integrating AI With Retro HardwareA Commodore 64 LLM Module - Konrad & Marek.eng.srt
|
55.2 KB
|
LeapFrog The Rowhammer Instruction Skip Attack - Andrew, Caner and Berk.eng.srt
|
66.9 KB
|
My Car, My Keys Obtaining CAN Bus SecOC Signing Keys - Willem & Greg.eng.srt
|
79.2 KB
|
Panel A New Root Of Trust Changing Computing With TEE.eng.srt
|
76.6 KB
|
Panel The Right To Secure - What, Who, How And Why.eng.srt
|
77.3 KB
|
Secrets Of Simos18 REng The Secure Boot Mechanism Of An ECU - Brian Ledbetter.eng.srt
|
80.7 KB
|
SRAM Data Remanence In SoCs Covert Storage And Exfiltration Risks In TEE.eng.srt
|
71.0 KB
|
State-of-the-Art Anti-Counterfeiting Attacks And Countermeasures - Scott Best.eng.srt
|
90.0 KB
|
TPM 2.0 Attestable Firmware Recovering Trust After Firmware Flaws.eng.srt
|
44.7 KB
|
TPMs & The Linux Kernel Unlocking A Better Path To Hardware Security - Ignat.eng.srt
|
81.4 KB
|
Trimmed Welcome Note John McMaster.eng.srt
|
25.8 KB
|
Who Monitors The Monitors Hacking The Monitor Control Command Set - Eugene Lim.eng.srt
|
67.3 KB
|
Total files 721
|