/slides/
|
Advanced-IC-Reverse-Engineering-Techniques-In-Depth-Analysis-of-A-Modern-Smart-Card-by-Olivier-THOMAS.pdf
|
49.4 MB
|
Attack-Methodologies-on-Security-Chips-Marcus-Janke-Peter-Laackmann.pdf
|
8.7 MB
|
Building-Hardware-We-Are-Proud-Of-by-Jon-Callas.pdf
|
567.6 KB
|
ERNW_hardwear.io_2015_living_in_a_fools_wireless-secured_paradise_skiese.pdf
|
2.7 MB
|
Hacking-Satellite-TV-receivers-Are-those-IoT-devices-secure_-by-Sofiane.pdf
|
4.2 MB
|
Hardware-Hacking-with-the-Beaglebone-B-Hack.pdf
|
3.9 MB
|
NSA-Playset-Bridging-the-Airgap-without-Radios-by-Michael-.pdf
|
7.3 MB
|
Slide-hardware_re_for_software_reversers-By-Czarny-Rigo.pdf
|
3.0 MB
|
Telecom-Security-lessons-learned-or-not_-by-Harald-Welte.pdf
|
96.5 KB
|
got-HW-crypto-slides_hardwear_gunnar-christian.pdf
|
9.4 MB
|
hardwear-io-2015-from-cots-to-research-lucian-cojocar-herbert-bos.pdf
|
1.8 MB
|
/.pad/
|
17734605
|
17.7 MB
|
24878270
|
24.9 MB
|
32986801
|
33.0 MB
|
30822554
|
30.8 MB
|
29368482
|
29.4 MB
|
29609832
|
29.6 MB
|
26250950
|
26.3 MB
|
30517053
|
30.5 MB
|
33457909
|
33.5 MB
|
24113282
|
24.1 MB
|
31725332
|
31.7 MB
|
33032800
|
33.0 MB
|
32808812
|
32.8 MB
|
32163924
|
32.2 MB
|
30460677
|
30.5 MB
|
31585065
|
31.6 MB
|
31831034
|
31.8 MB
|
29828710
|
29.8 MB
|
32456001
|
32.5 MB
|
29517197
|
29.5 MB
|
29483748
|
29.5 MB
|
19632030
|
19.6 MB
|
33524492
|
33.5 MB
|
28776375
|
28.8 MB
|
33510787
|
33.5 MB
|
2473523
|
2.5 MB
|
27235828
|
27.2 MB
|
33450784
|
33.5 MB
|
27248047
|
27.2 MB
|
16717550
|
16.7 MB
|
33484573
|
33.5 MB
|
17232509
|
17.2 MB
|
33425866
|
33.4 MB
|
14894229
|
14.9 MB
|
33490136
|
33.5 MB
|
19695073
|
19.7 MB
|
33479399
|
33.5 MB
|
28219264
|
28.2 MB
|
33467558
|
33.5 MB
|
28219268
|
28.2 MB
|
33467558
|
33.5 MB
|
3066476
|
3.1 MB
|
26287653
|
26.3 MB
|
32129195
|
32.1 MB
|
29391413
|
29.4 MB
|
22177467
|
22.2 MB
|
27044704
|
27.0 MB
|
31147668
|
31.1 MB
|
31774775
|
31.8 MB
|
21933512
|
21.9 MB
|
32125083
|
32.1 MB
|
26891424
|
26.9 MB
|
32663110
|
32.7 MB
|
32663110
|
32.7 MB
|
28809757
|
28.8 MB
|
22481163
|
22.5 MB
|
28304955
|
28.3 MB
|
1919036
|
1.9 MB
|
15319213
|
15.3 MB
|
31935456
|
31.9 MB
|
20309812
|
20.3 MB
|
21538811
|
21.5 MB
|
14266262
|
14.3 MB
|
12555702
|
12.6 MB
|
7764077
|
7.8 MB
|
9495940
|
9.5 MB
|
11412368
|
11.4 MB
|
1133361
|
1.1 MB
|
6848928
|
6.8 MB
|
4062933
|
4.1 MB
|
10911980
|
10.9 MB
|
2694865
|
2.7 MB
|
32088199
|
32.1 MB
|
32040485
|
32.0 MB
|
24276140
|
24.3 MB
|
31588662
|
31.6 MB
|
31957970
|
32.0 MB
|
19112602
|
19.1 MB
|
31415828
|
31.4 MB
|
24017779
|
24.0 MB
|
17025350
|
17.0 MB
|
33454267
|
33.5 MB
|
18118565
|
18.1 MB
|
33481163
|
33.5 MB
|
32793755
|
32.8 MB
|
33462736
|
33.5 MB
|
28800429
|
28.8 MB
|
33344864
|
33.3 MB
|
7802973
|
7.8 MB
|
33439928
|
33.4 MB
|
26088498
|
26.1 MB
|
33392558
|
33.4 MB
|
1039332
|
1.0 MB
|
33469640
|
33.5 MB
|
4505568
|
4.5 MB
|
33385033
|
33.4 MB
|
6454648
|
6.5 MB
|
33461741
|
33.5 MB
|
20478062
|
20.5 MB
|
33411710
|
33.4 MB
|
20294510
|
20.3 MB
|
33393754
|
33.4 MB
|
11041910
|
11.0 MB
|
33512278
|
33.5 MB
|
13402272
|
13.4 MB
|
33422298
|
33.4 MB
|
8373304
|
8.4 MB
|
33432203
|
33.4 MB
|
24622163
|
24.6 MB
|
33474062
|
33.5 MB
|
29091046
|
29.1 MB
|
33490536
|
33.5 MB
|
10829382
|
10.8 MB
|
33486612
|
33.5 MB
|
22134812
|
22.1 MB
|
33443582
|
33.4 MB
|
3147199
|
3.1 MB
|
33521903
|
33.5 MB
|
27298504
|
27.3 MB
|
33467599
|
33.5 MB
|
23081177
|
23.1 MB
|
33485987
|
33.5 MB
|
7328132
|
7.3 MB
|
33483165
|
33.5 MB
|
4703533
|
4.7 MB
|
33488743
|
33.5 MB
|
10226846
|
10.2 MB
|
33459128
|
33.5 MB
|
22401404
|
22.4 MB
|
33497372
|
33.5 MB
|
28365221
|
28.4 MB
|
33488266
|
33.5 MB
|
8414379
|
8.4 MB
|
17403736
|
17.4 MB
|
11717866
|
11.7 MB
|
19023069
|
19.0 MB
|
17336074
|
17.3 MB
|
12903152
|
12.9 MB
|
28162479
|
28.2 MB
|
32019448
|
32.0 MB
|
32216491
|
32.2 MB
|
32648382
|
32.6 MB
|
21422741
|
21.4 MB
|
28969997
|
29.0 MB
|
33469920
|
33.5 MB
|
21209878
|
21.2 MB
|
33451774
|
33.5 MB
|
17131637
|
17.1 MB
|
33473146
|
33.5 MB
|
9549882
|
9.5 MB
|
33480782
|
33.5 MB
|
23058424
|
23.1 MB
|
33554069
|
33.6 MB
|
24451993
|
24.5 MB
|
33477333
|
33.5 MB
|
9122084
|
9.1 MB
|
33476301
|
33.5 MB
|
32124120
|
32.1 MB
|
33443648
|
33.4 MB
|
14402851
|
14.4 MB
|
33469179
|
33.5 MB
|
16421624
|
16.4 MB
|
22334408
|
22.3 MB
|
33481096
|
33.5 MB
|
7184804
|
7.2 MB
|
31821125
|
31.8 MB
|
5201593
|
5.2 MB
|
23654080
|
23.7 MB
|
738791
|
738.8 KB
|
3526278
|
3.5 MB
|
9394287
|
9.4 MB
|
31083543
|
31.1 MB
|
27001827
|
27.0 MB
|
25187996
|
25.2 MB
|
29974825
|
30.0 MB
|
33473173
|
33.5 MB
|
24118648
|
24.1 MB
|
32572785
|
32.6 MB
|
33492169
|
33.5 MB
|
8656041
|
8.7 MB
|
20925692
|
20.9 MB
|
33507526
|
33.5 MB
|
15083312
|
15.1 MB
|
33533213
|
33.5 MB
|
17110234
|
17.1 MB
|
33470719
|
33.5 MB
|
25630656
|
25.6 MB
|
33482304
|
33.5 MB
|
22990850
|
23.0 MB
|
33481818
|
33.5 MB
|
12331215
|
12.3 MB
|
33522505
|
33.5 MB
|
19907880
|
19.9 MB
|
33472784
|
33.5 MB
|
22789291
|
22.8 MB
|
33485259
|
33.5 MB
|
2518049
|
2.5 MB
|
33458458
|
33.5 MB
|
29653901
|
29.7 MB
|
33476714
|
33.5 MB
|
28413802
|
28.4 MB
|
33532274
|
33.5 MB
|
8396097
|
8.4 MB
|
33480314
|
33.5 MB
|
11389284
|
11.4 MB
|
33480922
|
33.5 MB
|
338741
|
338.7 KB
|
33474431
|
33.5 MB
|
23817780
|
23.8 MB
|
33472513
|
33.5 MB
|
12603432
|
12.6 MB
|
33464163
|
33.5 MB
|
2164585
|
2.2 MB
|
33507564
|
33.5 MB
|
4149065
|
4.1 MB
|
26015520
|
26.0 MB
|
19379399
|
19.4 MB
|
33509799
|
33.5 MB
|
7433000
|
7.4 MB
|
33511950
|
33.5 MB
|
33010775
|
33.0 MB
|
29186648
|
29.2 MB
|
33476171
|
33.5 MB
|
8951976
|
9.0 MB
|
33477810
|
33.5 MB
|
4440407
|
4.4 MB
|
33512155
|
33.5 MB
|
9431061
|
9.4 MB
|
33480678
|
33.5 MB
|
31727960
|
31.7 MB
|
33457464
|
33.5 MB
|
2111384
|
2.1 MB
|
33485393
|
33.5 MB
|
8727292
|
8.7 MB
|
33534322
|
33.5 MB
|
20693601
|
20.7 MB
|
33452419
|
33.5 MB
|
24399651
|
24.4 MB
|
33466305
|
33.5 MB
|
22790018
|
22.8 MB
|
33466185
|
33.5 MB
|
639361
|
639.4 KB
|
33541219
|
33.5 MB
|
24877556
|
24.9 MB
|
33480220
|
33.5 MB
|
11827901
|
11.8 MB
|
33456877
|
33.5 MB
|
14652362
|
14.7 MB
|
33472641
|
33.5 MB
|
32513244
|
32.5 MB
|
33440525
|
33.4 MB
|
17453172
|
17.5 MB
|
32481782
|
32.5 MB
|
31234633
|
31.2 MB
|
26495502
|
26.5 MB
|
31148563
|
31.1 MB
|
22689587
|
22.7 MB
|
31553760
|
31.6 MB
|
33417796
|
33.4 MB
|
29443949
|
29.4 MB
|
33492722
|
33.5 MB
|
13361818
|
13.4 MB
|
33544103
|
33.5 MB
|
24186297
|
24.2 MB
|
33508550
|
33.5 MB
|
9668519
|
9.7 MB
|
33464217
|
33.5 MB
|
28809993
|
28.8 MB
|
33536323
|
33.5 MB
|
8100717
|
8.1 MB
|
9485484
|
9.5 MB
|
33481105
|
33.5 MB
|
7223076
|
7.2 MB
|
33460273
|
33.5 MB
|
32711357
|
32.7 MB
|
33477457
|
33.5 MB
|
27896884
|
27.9 MB
|
33486604
|
33.5 MB
|
9816391
|
9.8 MB
|
33068058
|
33.1 MB
|
33505075
|
33.5 MB
|
2294194
|
2.3 MB
|
33506467
|
33.5 MB
|
13595942
|
13.6 MB
|
33467132
|
33.5 MB
|
9355985
|
9.4 MB
|
33469584
|
33.5 MB
|
33341356
|
33.3 MB
|
33485639
|
33.5 MB
|
33286666
|
33.3 MB
|
33456252
|
33.5 MB
|
17726778
|
17.7 MB
|
33505194
|
33.5 MB
|
1983131
|
2.0 MB
|
33504013
|
33.5 MB
|
9756855
|
9.8 MB
|
33464462
|
33.5 MB
|
4984802
|
5.0 MB
|
33477236
|
33.5 MB
|
16832459
|
16.8 MB
|
33473507
|
33.5 MB
|
13259164
|
13.3 MB
|
33471865
|
33.5 MB
|
690808
|
690.8 KB
|
33500070
|
33.5 MB
|
33549755
|
33.5 MB
|
33180862
|
33.2 MB
|
/video/
|
Javier Speaker Bytes.mp4
|
521.6 KB
|
Jon Callas Speaker Bytes.mp4
|
745.6 KB
|
Olivier Thomas Speaker Bytes.mp4
|
1.4 MB
|
Speaker Byte Joe FitzPatrick.mp4
|
3.1 MB
|
Speaker Byte Michael Leibowitz.mp4
|
2.0 MB
|
/slides/
|
OLD SKEWL HACKING DVB-T Black Button Pivot by Adam Laur.pdf
|
1.7 MB
|
Reverse Engineering vehicles Burpsuite Style by Javier & Ferdi.pptx
|
3.7 MB
|
Self driving cars and not so autonomous security by Nicolas Massaviol.pdf
|
1.1 MB
|
Tower defense for hackers Layered (in-)security for microcontrollers by Milosch.pdf
|
4.0 MB
|
hardware-security-conference-hans-de-vries-NCSC.pptx
|
4.1 MB
|
/video/
|
Analyzing vehicle networks with CANToolz by Michael Elizarov.mp4
|
81.0 MB
|
Analyzing vehicle networks with CANToolz by Michael Elizarov.srt
|
29.9 KB
|
Dropping The MIC Picking up the Keystore by Stefan Kiese.mp4
|
71.9 MB
|
Dropping The MIC Picking up the Keystore by Stefan Kiese.srt
|
43.6 KB
|
Electromagnetic Harmonic Attack by Patrick Haddad.mp4
|
98.2 MB
|
Hardware Implants for Flashy Lights and Root Shells by Joseph Fitzpatrick.mp4
|
107.0 MB
|
Hardware Implants for Flashy Lights and Root Shells by Joseph Fitzpatrick.srt
|
103.6 KB
|
How to fool an ADC by Alexander Bolshev.mp4
|
107.0 MB
|
Keynote by SERGEY BRATUS.mp4
|
83.9 MB
|
Keynote by SERGEY BRATUS.srt
|
69.9 KB
|
Look at devices used to attack ATMs & POS systems by Weston Hecker - YouTube.mp4
|
83.4 MB
|
Look at devices used to attack ATMs & POS systems by Weston Hecker - YouTube.srt
|
128.6 KB
|
OLD SKEWL HACKING - DVB-T Black Button Pivot by Adam Laurie.mp4
|
85.8 MB
|
OLD SKEWL HACKING - DVB-T Black Button Pivot by Adam Laurie.srt
|
64.3 KB
|
Reverse Engineering vehicles Burpsuite Style by Javier & Ferdinand.mp4
|
81.0 MB
|
Reverse Engineering vehicles Burpsuite Style by Javier & Ferdinand.srt
|
75.0 KB
|
Self driving cars and not so autonomous security by Nicolas Massaviol (2).mp4
|
106.0 MB
|
Self driving cars and not so autonomous security by Nicolas Massaviol (2).srt
|
86.9 KB
|
Self driving cars and not so autonomous security by Nicolas Massaviol.mp4
|
106.0 MB
|
Self driving cars and not so autonomous security by Nicolas Massaviol.srt
|
86.9 KB
|
Tower defense for hackers - Layered (in-)security for microcontrollers by Milosch.mp4
|
64.0 MB
|
/slides/
|
black-box-debugging-embedded-systems.pptx
|
7.3 MB
|
flip-a-bit-grab-a-key-hardwear-io-2017-v1-1.pdf
|
1.4 MB
|
fpga-re-azonenberg.pptx
|
4.2 MB
|
hardware-root-of-mistrust-hardwear.pdf
|
11.4 MB
|
hardwear-gras-razavi.pdf
|
6.5 MB
|
hardwear-io-den-haag-20170922-christof-paar.pdf
|
2.4 MB
|
hardwear-io-lopesEsteves-kasmi-cottais-ghost-in-your-transmitter-phycovert-channels-detection.pdf
|
1.8 MB
|
hardwear-patrick-paumen.pptx
|
11.6 MB
|
hio.pdf
|
1.4 MB
|
hwio-keynote.pdf
|
6.7 MB
|
metasploit-HW-bridge-hardwear.io-craig-smith.pdf
|
891.3 KB
|
metasploit-hw-bridge-hardwear.io.pdf
|
891.3 KB
|
niek-cristofaro-escalating-privileges-in-linux-using-fi-presentation-hardwareio.pdf
|
4.7 MB
|
rtos-exploit-mitigation-blues-hardwear-io.pptx
|
44.6 MB
|
slides-craig-ramsay.pdf
|
5.2 MB
|
/video/
|
CXO Panel - UnDependable Dependencies In Safety Critical Infrastructure.mp4
|
65.2 MB
|
CXO Panel - Who Owns Your Car by Dr.Ana Magazinius, Abe Chen, Craig Smith.mp4
|
85.3 MB
|
Challenging Real World Targets by Dr Sergei Skorobogatov.mp4
|
68.7 MB
|
Flip A Bit, Grab A Key - Symbolic Execution Edition by Jasper van Woudenberg.mp4
|
80.4 MB
|
Ghost in your Transmitter by Emmanuel Cottais, Chaouki Kasmi, José Lopes Esteves.mp4
|
79.1 MB
|
Hack Your Body, One Implant At A Time by Patrick Paumen.mp4
|
86.4 MB
|
Hardware Root Of Mistrust by Joe FitzPatrick.mp4
|
88.1 MB
|
Hardware Trojans And The Internet Of Things by Dr. Christof Paar.mp4
|
92.9 MB
|
KERNELFAULT by Niek Timmers & Cristofaro Mune.mp4
|
91.2 MB
|
Latest Metasploit Hardware Bridge Techniques by Craig Smith.mp4
|
89.3 MB
|
Reverse Engineering Of Programmable Logic Bitstreams by Andrew Zonenberg.mp4
|
66.0 MB
|
Shaking trust in hardware by Ben Gras&Kaveh Razavi.mp4
|
93.8 MB
|
TEMPEST Attacks Against AES by Craig Ramsay.mp4
|
63.0 MB
|
The RTOS Exploit Mitigation Blues by Jos Wetzels.mp4
|
89.8 MB
|
To Guess Wrong Is Expensive by Sarani Bhattacharya.mp4
|
64.4 MB
|
Wall Game Q&A.mp4
|
1.5 MB
|
/slides/
|
2018_keynote_sharing_the_load_kate_temkin.pdf
|
1.5 MB
|
Car-forensics_Gabriel-Stefan.pptx
|
9.3 MB
|
It-WISNt-me-attacking-industrial-wireless-mesh.pdf
|
2.0 MB
|
STRATEGIES-TO-HARDEN-AND-NEUTRALIZE-UAV-USING-RF-DEW-BY-JOSÉ[email protected]
|
1.6 MB
|
The-Race-to-Secure-Texas-Instruments-Graphing-Calculators-by-Brandon-Wilson-at-hardwear.io-2018.pptx
|
14.4 MB
|
There-Goes-Your-PIN-Exploiting-Smartphone-Sensor-Fusion-Under-Single-and-Cross-User-Setting-by-David-Berend.pptx
|
2.1 MB
|
ble-security essentials.pdf
|
9.5 MB
|
tlbleed-hardwear-io-2018-Ben-Kaveh.pdf
|
16.5 MB
|
/video/
|
Attacking industrial Wireless Mesh Networks by E. Paternotte And M. v Ommeren.eng.srt
|
100.2 KB
|
Attacking industrial Wireless Mesh Networks by E. Paternotte And M. v Ommeren.mp4
|
49.0 MB
|
Black Box Is Dead. Long Live Black Box by V. Kononovich And A. Stennikov.eng.srt
|
73.3 KB
|
Black Box Is Dead. Long Live Black Box by V. Kononovich And A. Stennikov.mp4
|
34.3 MB
|
Fault Injection On Automotive Diagnosis Protocols by Santiago Cordoba.eng.srt
|
91.7 KB
|
Fault Injection On Automotive Diagnosis Protocols by Santiago Cordoba.mp4
|
38.3 MB
|
Hardwear.io 2018 The Race To Secure Texas Instruments Graphing Calculators by Brandon Wilson.eng.srt
|
209.6 KB
|
Hardwear.io 2018 The Race To Secure Texas Instruments Graphing Calculators by Brandon Wilson.mp4
|
59.3 MB
|
Product Security For IoT - Mission Impossible by Alex Poschmann.eng.srt
|
114.5 KB
|
Product Security For IoT - Mission Impossible by Alex Poschmann.mp4
|
41.0 MB
|
Reverse- Engineering Based Integrated Circuit Attacks by O. Thomas.eng.srt
|
161.9 KB
|
Reverse- Engineering Based Integrated Circuit Attacks by O. Thomas.mp4
|
66.1 MB
|
Smart Car Forensics And Sensor Warfare by Gabriel Cirlig And Stefan Tanase.eng.srt
|
84.8 KB
|
Smart Car Forensics And Sensor Warfare by Gabriel Cirlig And Stefan Tanase.mp4
|
29.0 MB
|
Spreading The Load - Building A Better Hardware Hacking Community by Kate Temkin.eng.srt
|
169.4 KB
|
Spreading The Load - Building A Better Hardware Hacking Community by Kate Temkin.mp4
|
60.7 MB
|
Strategies To Harden And Neutralize UAV Using RF DEW by José Lopes Esteves.eng.srt
|
92.7 KB
|
Strategies To Harden And Neutralize UAV Using RF DEW by José Lopes Esteves.mp4
|
46.6 MB
|
TLBleed - When Protecting Your CPU Caches Is Not Enough by B. Gras And K. Razavi.eng.srt
|
142.7 KB
|
TLBleed - When Protecting Your CPU Caches Is Not Enough by B. Gras And K. Razavi.mp4
|
46.8 MB
|
The Future Of Hardware Security Is In Open Standards - Helena Handschuh.eng.srt
|
160.7 KB
|
The Future Of Hardware Security Is In Open Standards - Helena Handschuh.mp4
|
56.1 MB
|
There Goes Your PIN - Exploiting Smartphone Sensor Fusion by David Berend.eng.srt
|
42.2 KB
|
There Goes Your PIN - Exploiting Smartphone Sensor Fusion by David Berend.mp4
|
20.2 MB
|
Who Needs IoT Security Certification - CXO Panel - hardwear.io 2018.eng.srt
|
132.1 KB
|
Who Needs IoT Security Certification - CXO Panel - hardwear.io 2018.mp4
|
58.7 MB
|
Z-Shave. Exploiting Z-Wave Downgrade Attacks by Andrew Tierney.eng.srt
|
122.2 KB
|
Z-Shave. Exploiting Z-Wave Downgrade Attacks by Andrew Tierney.mp4
|
42.5 MB
|
/hardwear.io 2019 Netherlands/
|
CXO PANEL Security Certifications for IoT Devices.eng.srt
|
80.4 KB
|
CXO PANEL Security Certifications for IoT Devices.mp4
|
71.6 MB
|
Day-1 with a TTIG-868 - Brian Butterly.eng.srt
|
63.9 KB
|
Day-1 with a TTIG-868 - Brian Butterly.mp4
|
56.3 MB
|
Electric vehicle CAN man-in-the-middling - Emile Nijssenv.eng.srt
|
67.8 KB
|
Electric vehicle CAN man-in-the-middling - Emile Nijssenv.mp4
|
45.0 MB
|
Exposing device features on 4G & 5G networks - Altaf Shaik & Ravishankar Borgaonkar - NL 2019.eng.srt
|
110.9 KB
|
Exposing device features on 4G & 5G networks - Altaf Shaik & Ravishankar Borgaonkar - NL 2019.mp4
|
64.0 MB
|
Hacking pre-obd car for fun and horsepower - Gyver Ferrand.eng.srt
|
32.5 KB
|
Hacking pre-obd car for fun and horsepower - Gyver Ferrand.mp4
|
39.8 MB
|
Hardware security evaluation of Intel MAX 10 FPGAs - Dr. Sergei Skorobogatov.eng.srt
|
86.8 KB
|
Hardware security evaluation of Intel MAX 10 FPGAs - Dr. Sergei Skorobogatov.mp4
|
111.1 MB
|
IC Surgery getting to the heart of the problem with the smallest scalpel - John Walker - Keynote.eng.srt
|
68.4 KB
|
IC Surgery getting to the heart of the problem with the smallest scalpel - John Walker - Keynote.mp4
|
59.8 MB
|
It's easier to break than to patch a stealthy DoS attack on CAN - Stefano Zanero & Stefano Longari.eng.srt
|
71.3 KB
|
It's easier to break than to patch a stealthy DoS attack on CAN - Stefano Zanero & Stefano Longari.mp4
|
62.4 MB
|
Poking the S in SD cards - Nicolas Oberli.eng.srt
|
65.7 KB
|
Poking the S in SD cards - Nicolas Oberli.mp4
|
56.9 MB
|
RIDLed with CPU bugs - Alyssa Milburn & Stephan van Schaik.eng.srt
|
95.3 KB
|
RIDLed with CPU bugs - Alyssa Milburn & Stephan van Schaik.mp4
|
44.7 MB
|
Roots of Trust and Attestation - Trammell Hudson - Keynote.eng.srt
|
57.1 KB
|
Roots of Trust and Attestation - Trammell Hudson - Keynote.mp4
|
72.3 MB
|
Sniffle A low-cost sniffer for Bluetooth 5 - Sultan Qasim Khan.eng.srt
|
66.2 KB
|
Sniffle A low-cost sniffer for Bluetooth 5 - Sultan Qasim Khan.mp4
|
58.7 MB
|
Tamper Proofing Commodity Hardware & other Applications - Christian Zenger & Lars Steinschulte.mp4
|
83.3 MB
|
When hardware attacks scale - Marc Witteman.mp4
|
55.4 MB
|
/slides/
|
Bluetooth-Hacking-Mike Ryan-hardwear-io-usa-2019.pdf
|
14.5 MB
|
IntegratedCircuitOffensiveSecurity-Olivier-Thomas-hardwear-io-usa-2019.pdf
|
83.3 MB
|
Sound-Blaster-Clone-Eric-hardwear-io-usa-2019.pdf
|
20.7 MB
|
Speculative-execution-vulnerabilities-From-a-Simple-Oversight-to-a-Technological-Nightmare-Raoul-Strackx-hardwear-io-usa-2019.pdf
|
5.4 MB
|
Top-10-Secure-Boot-Mistakes-v1.1-hardwear-io-usa-2019-jasper-van-woudenberg.pdf
|
1.5 MB
|
control_requests_Kate-Temkin-hardwear-io-usa-2019.pdf
|
1.3 MB
|
front_matter_Kate-Temkin-hardwear-io-usa-2019.pdf
|
906.1 KB
|
post-quantum-cryptography-michael-hamburg-hardwear-io-usa-2019.pptx
|
12.1 MB
|
using-symbolic-execution-for-IoT-bug-hunting-grzegorz-wypych-hardwear-io-usa-2019.pdf
|
4.6 MB
|
/video/
|
Bits From The Matrix Optical ROM Extraction Chris Gerlinsky.eng.srt
|
84.5 KB
|
Bits From The Matrix Optical ROM Extraction Chris Gerlinsky.mp4
|
79.5 MB
|
Bluetooth Hacking Tools And Techniques Mike Ryan.eng.srt
|
102.7 KB
|
Bluetooth Hacking Tools And Techniques Mike Ryan.mp4
|
83.5 MB
|
Cloning A Sound Card Eric Schlaepfer.eng.srt
|
81.3 KB
|
Cloning A Sound Card Eric Schlaepfer.mp4
|
24.0 MB
|
Exposing The Deep-Secure Elements Of Smartcards Christopher Tarnovsky.eng.srt
|
73.7 KB
|
Exposing The Deep-Secure Elements Of Smartcards Christopher Tarnovsky.mp4
|
111.2 MB
|
Hardwear.io Darth Vader badge soldering (4x speed).eng.srt
|
0.4 KB
|
Hardwear.io Darth Vader badge soldering (4x speed).mp4
|
9.1 MB
|
Integrated Circuit Offensive Security Olivier Thomas from Texplained.eng.srt
|
77.1 KB
|
Integrated Circuit Offensive Security Olivier Thomas from Texplained.mp4
|
91.5 MB
|
Low-Cost IC Emission Reverse Engineering John McMaster.eng.srt
|
78.1 KB
|
Low-Cost IC Emission Reverse Engineering John McMaster.mp4
|
68.5 MB
|
Nationally Critical Infrastructure needs Secure Hardware Dr. Joseph Kiniry.eng.srt
|
110.8 KB
|
Nationally Critical Infrastructure needs Secure Hardware Dr. Joseph Kiniry.mp4
|
86.3 MB
|
OverTime Remote Timing Attacks Against IoT Devices Cristofaro Mune.eng.srt
|
85.3 KB
|
OverTime Remote Timing Attacks Against IoT Devices Cristofaro Mune.mp4
|
84.2 MB
|
Speculative execution vulnerabilities Raoul Strackx.mp4
|
78.3 MB
|
Top 10 Secure Boot Mistakes Jasper Van Woudenberg.eng.srt
|
73.3 KB
|
Top 10 Secure Boot Mistakes Jasper Van Woudenberg.mp4
|
93.5 MB
|
/hardwear.io 2020 Virtual/
|
A Full Break of Bitstream Encryption of Xilinx 7-Series FPGAs - Maik Ender.mp4
|
35.3 MB
|
Breaking Deployed Crypto, The Side-channel Analyst's Way - Daniel Moghimi.mp4
|
28.4 MB
|
Capturing Mask ROMs - John McMaster.mp4
|
43.5 MB
|
Defeating TLS client authentication using fault attack - Nicolas & Sylvain.mp4
|
32.8 MB
|
From Bluetooth Standard to Standard Compliant 0-days - Daniele Antonioli.mp4
|
30.0 MB
|
Hints from Hardware Security for solving real-world challenges - Dr Sergei.mp4
|
24.2 MB
|
Practical protection from firmware attacks in hardware supply chain - Sophia d'Antoine.mp4
|
36.0 MB
|
Quarantine Chill Mix.mp4
|
40.1 MB
|
Reverse engineering of neural network architectures via side-channel - Stjepan Picek.mp4
|
41.9 MB
|
Wall Challenge Questions Answers.mp4
|
3.6 MB
|
/hardwear.io 2020 Webinars/
|
A decade of Machine Learning in Profiled Side-channel Analysis - Stjepan Picek.eng.srt
|
81.3 KB
|
A decade of Machine Learning in Profiled Side-channel Analysis - Stjepan Picek.mp4
|
43.0 MB
|
Analyzing AMD SEV's Remote Attestation - Robert Buhren.mp4
|
34.5 MB
|
Analyzing Embedded Systems The Smart Way - Henrik Ferdinand Noelscher.eng.srt
|
62.3 KB
|
Analyzing Embedded Systems The Smart Way - Henrik Ferdinand Noelscher.mp4
|
24.9 MB
|
Beyond Root Custom Firmware for Embedded Mobile Chipsets - Christopher Wade.mp4
|
46.2 MB
|
Bluetooth 5 Hacking by Sultan Qasim Khan.eng.srt
|
46.9 KB
|
Bluetooth 5 Hacking by Sultan Qasim Khan.mp4
|
18.5 MB
|
Bringing light into the Black Box - Step by step black-box reverse engineering of ECUs.eng.srt
|
21.2 KB
|
Bringing light into the Black Box - Step by step black-box reverse engineering of ECUs.mp4
|
50.0 MB
|
Building Whiteboxes attacks and defenses - Matthieu Daumas.eng.srt
|
83.7 KB
|
Building Whiteboxes attacks and defenses - Matthieu Daumas.mp4
|
41.5 MB
|
Building a Repairable Future - Kyle Wiens.eng.srt
|
72.1 KB
|
Building a Repairable Future - Kyle Wiens.mp4
|
44.1 MB
|
DL-based Denoising of TEMPEST Images for Efficient OCR - Santiago & Juan.eng.srt
|
72.6 KB
|
DL-based Denoising of TEMPEST Images for Efficient OCR - Santiago & Juan.mp4
|
54.8 MB
|
Embedded Physical Attacks by Kostas Papagiannopoulos.eng.srt
|
31.9 KB
|
Embedded Physical Attacks by Kostas Papagiannopoulos.mp4
|
13.6 MB
|
Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares.eng.srt
|
81.6 KB
|
Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares.mp4
|
44.3 MB
|
Hardware Acceleration on Reconfigurable Platform for Efficient Cryptography Design - Elif Bilge Kavun.eng.srt
|
69.2 KB
|
Hardware Acceleration on Reconfigurable Platform for Efficient Cryptography Design - Elif Bilge Kavun.mp4
|
31.0 MB
|
How efiXplorer helping to solve challenges in reverse engineering of UEFI firmware - Alex Matrosov.eng.srt
|
96.0 KB
|
How efiXplorer helping to solve challenges in reverse engineering of UEFI firmware - Alex Matrosov.mp4
|
37.5 MB
|
Hunting UEFI Firmware Implants by Alex Matrosov.eng.srt
|
77.7 KB
|
Hunting UEFI Firmware Implants by Alex Matrosov.mp4
|
38.7 MB
|
Machine Learning & Side-channel Attacks by Stjepan Picek.eng.srt
|
22.2 KB
|
Machine Learning & Side-channel Attacks by Stjepan Picek.mp4
|
25.2 MB
|
RF shadow games - Sébastien Dudek.eng.srt
|
74.1 KB
|
RF shadow games - Sébastien Dudek.mp4
|
55.7 MB
|
RISC-V How an open ISA benefits hardware security - Drew Fustini.eng.srt
|
73.5 KB
|
RISC-V How an open ISA benefits hardware security - Drew Fustini.mp4
|
33.2 MB
|
Reverse Engineering UDS and firmware on the Tesla Model S Battery Management System - Patrick Kiley.eng.srt
|
80.0 KB
|
Reverse Engineering UDS and firmware on the Tesla Model S Battery Management System - Patrick Kiley.mp4
|
43.3 MB
|
Reverse engineering raw firmware tool to get you started - Guillaume Heilles.eng.srt
|
81.9 KB
|
Reverse engineering raw firmware tool to get you started - Guillaume Heilles.mp4
|
54.5 MB
|
Securing CAN bus augmenting the CAN protocol - Dr. Ken Tindell.eng.srt
|
90.3 KB
|
Securing CAN bus augmenting the CAN protocol - Dr. Ken Tindell.mp4
|
31.4 MB
|
Securing keys in leading-edge chips with Physical Unclonable Functions - Geert-Jan Schrijen.eng.srt
|
46.9 KB
|
Securing keys in leading-edge chips with Physical Unclonable Functions - Geert-Jan Schrijen.mp4
|
29.4 MB
|
Side-channel analysis on SoC devices a Graal's quest - Hugues Thiebeauld.mp4
|
41.1 MB
|
Sinking U-Boots with Depthcharge Effective Exploitation of Boot-Time Security Debt - Jon Szymaniak.mp4
|
47.7 MB
|
The current landscape of global IoT security regulations - Brad Ree.eng.srt
|
44.6 KB
|
The current landscape of global IoT security regulations - Brad Ree.mp4
|
26.1 MB
|
Why Fault Injection is attacker's weapon of choice in IoT era - Marc Witteman.eng.srt
|
42.5 KB
|
Why Fault Injection is attacker's weapon of choice in IoT era - Marc Witteman.mp4
|
34.1 MB
|
/hardwear.io 2021 Netherlands/
|
A Side Journey To Titan by Victor Lomné.mp4
|
71.5 MB
|
An Analysis Of Machine Clears For Transient Execution Attacks by Enrico & Hany.eng.srt
|
78.3 KB
|
An Analysis Of Machine Clears For Transient Execution Attacks by Enrico & Hany.mp4
|
58.2 MB
|
Automated Vulnerability Hunting In SMM Using Brick by Assaf & Itai.eng.srt
|
76.6 KB
|
Automated Vulnerability Hunting In SMM Using Brick by Assaf & Itai.mp4
|
62.7 MB
|
Blackboxing Diebold-Nixdorf ATMs by Vladimir Kononovich.eng.srt
|
42.3 KB
|
Blackboxing Diebold-Nixdorf ATMs by Vladimir Kononovich.mp4
|
24.1 MB
|
BlueMirror Defeating Authentication In Bluetooth Protocols by Tristan & Jose.eng.srt
|
73.8 KB
|
BlueMirror Defeating Authentication In Bluetooth Protocols by Tristan & Jose.mp4
|
68.9 MB
|
Breaking The Security Barrier Of A B.Braun Infusion Pump by Douglas & Philippe.eng.srt
|
97.0 KB
|
Breaking The Security Barrier Of A B.Braun Infusion Pump by Douglas & Philippe.mp4
|
65.0 MB
|
Can We Build Secure Open Hardware Roots Of Trust (Panel) by Trammell & Fredrik.eng.srt
|
69.0 KB
|
Can We Build Secure Open Hardware Roots Of Trust (Panel) by Trammell & Fredrik.mp4
|
58.4 MB
|
Closing Note and Prizes by Hardwear.io.eng.srt
|
20.1 KB
|
Closing Note and Prizes by Hardwear.io.mp4
|
12.9 MB
|
Divide & Conquer Revisited FI As A SW EXP Primitive by Rafael and Federico.eng.srt
|
102.0 KB
|
Divide & Conquer Revisited FI As A SW EXP Primitive by Rafael and Federico.mp4
|
76.3 MB
|
EEPROM It Will All End In Tears by Philippe Teuwen & Christian Herrmann.eng.srt
|
88.1 KB
|
EEPROM It Will All End In Tears by Philippe Teuwen & Christian Herrmann.mp4
|
77.9 MB
|
Flippin‘ Fake Flops For Fun, Fame And Fortune by Jasper Van Woudenberg.eng.srt
|
88.2 KB
|
Flippin‘ Fake Flops For Fun, Fame And Fortune by Jasper Van Woudenberg.mp4
|
66.5 MB
|
Opening Note - Antriksh Shah.eng.srt
|
13.2 KB
|
Opening Note - Antriksh Shah.mp4
|
8.7 MB
|
Over The Air-Tag Shenanigans With A Keyfinder by Jiska , Fabian And Thomas.eng.srt
|
74.2 KB
|
Over The Air-Tag Shenanigans With A Keyfinder by Jiska , Fabian And Thomas.mp4
|
55.3 MB
|
Supply Chain Security (and Attacks) panel by Cristofaro, David and Jan.eng.srt
|
97.6 KB
|
Supply Chain Security (and Attacks) panel by Cristofaro, David and Jan.mp4
|
86.0 MB
|
Teardown And Feasibility Study Of IronKey by Sergei Skorobogatov.eng.srt
|
81.8 KB
|
Teardown And Feasibility Study Of IronKey by Sergei Skorobogatov.mp4
|
68.2 MB
|
When Threat Models Meet by Herbert Bos.eng.srt
|
113.9 KB
|
When Threat Models Meet by Herbert Bos.mp4
|
83.2 MB
|
/slides/
|
Building CANtact Pro - An Open Source CAN Bus Tool by Eric Evenchick.pdf
|
1.1 MB
|
Enabling dynamic analysis of Legacy Embedded Systems in full emulated environment by Ta-Lun Yen.pdf
|
2.3 MB
|
Extracting programmable logic with photons by John McMaster.pdf
|
7.1 MB
|
Interacting with xOS hardware from user space by Jiska Classen.pdf
|
2.4 MB
|
Proving the efficacy of software countermeasures for fault injection by Joshua Beaker.pptm
|
10.9 MB
|
The Mooltipass Open Source Hardware Authentication Ecosystem by Mathieu Stephan.pdf
|
2.0 MB
|
/video/
|
Boost your hardware reversing with glscopeclient Andrew Zonenberg hardwear.io USA Conference 21.eng(translated).eng(translated).srt
|
136.6 KB
|
Boost your hardware reversing with glscopeclient Andrew Zonenberg hardwear.io USA Conference 21.mp4
|
71.2 MB
|
Building CANtact Pro An Open Source CAN Bus Tool Eric Evenchick hardwear.io USA Conference 2021.eng(translated).eng(translated).srt
|
61.7 KB
|
Building CANtact Pro An Open Source CAN Bus Tool Eric Evenchick hardwear.io USA Conference 2021.mp4
|
20.2 MB
|
Call for Papers Pro Tips by Cristofaro Mune hardwear.io 2021.eng(translated).eng(translated).srt
|
10.3 KB
|
Call for Papers Pro Tips by Cristofaro Mune hardwear.io 2021.mp4
|
9.4 MB
|
Enabling dynamic analysis of Legacy Embedded Systems in full emulated environment Lun Yen.eng(translated).eng(translated).srt
|
45.9 KB
|
Enabling dynamic analysis of Legacy Embedded Systems in full emulated environment Lun Yen.mp4
|
23.9 MB
|
Extracting programmable logic with photons John McMaster hardwear.io USA Conference 2021.eng(translated).eng(translated).srt
|
90.2 KB
|
Extracting programmable logic with photons John McMaster hardwear.io USA Conference 2021.mp4
|
38.3 MB
|
Interacting with OS hardware from user space Jiska Classen hardwear.io USA Conference 2021.eng(translated).eng(translated).srt
|
18.1 KB
|
Interacting with OS hardware from user space Jiska Classen hardwear.io USA Conference 2021.mp4
|
25.5 MB
|
Proving the efficacy of software countermeasures for fault injection Joshua Beaker hardwear.io.mp4
|
24.1 MB
|
Secure Builds for Secure Software Chris Frantz hardwear.io USA Conference 2021.eng(translated).eng(translated).srt
|
73.3 KB
|
Secure Builds for Secure Software Chris Frantz hardwear.io USA Conference 2021.mp4
|
26.3 MB
|
Silicon Security Panel Talk hardwear.io USA Conference 2021.eng(translated).eng(translated).srt
|
94.2 KB
|
Silicon Security Panel Talk hardwear.io USA Conference 2021.mp4
|
68.0 MB
|
The Cheapskate Revolution Hardware Attacks from Millions to Tens of Dollars Colin O'Flynn.eng(translated).eng(translated).srt
|
77.0 KB
|
The Cheapskate Revolution Hardware Attacks from Millions to Tens of Dollars Colin O'Flynn.mp4
|
72.8 MB
|
The Mooltipass Open Source Hardware Authentication Ecosystem Mathieu Stephan hardwear.io USA Con.eng(translated).eng(translated).srt
|
67.8 KB
|
The Mooltipass Open Source Hardware Authentication Ecosystem Mathieu Stephan hardwear.io USA Con.mp4
|
23.7 MB
|
/hardwear.io 2022 USA/
|
Armed To Boot A Novel Enhancement To Arm's Secure Boot Chain by Derek & Ryan.mp4
|
34.0 MB
|
Armed To Boot A Novel Enhancement To Arm's Secure Boot Chain by Derek & Ryan.srt
|
49.4 KB
|
Breaking A Recent SoC’s Hardware AES Accelerator Using Body Biasing Injection by Karim M. Abdellatif.mp4
|
31.3 MB
|
Breaking A Recent SoC’s Hardware AES Accelerator Using Body Biasing Injection by Karim M. Abdellatif.srt
|
48.0 KB
|
Breaking SoC Security By Glitching OTP Data Transfers by Cristofaro Mune.mp4
|
53.5 MB
|
Breaking SoC Security By Glitching OTP Data Transfers by Cristofaro Mune.srt
|
87.3 KB
|
Exploiting AMBA AXI Protocol For DoS Attacks Of Shared Resources - Francesco Restuccia - hardwear.io.mp4
|
57.8 MB
|
Exploiting AMBA AXI Protocol For DoS Attacks Of Shared Resources - Francesco Restuccia - hardwear.io.srt
|
84.8 KB
|
Grinding Tractors To A Halt Growing Pains In Agricultural HardwareSecurity by Sick Codes hardwear.io.mp4
|
33.8 MB
|
Grinding Tractors To A Halt Growing Pains In Agricultural HardwareSecurity by Sick Codes hardwear.io.srt
|
68.8 KB
|
Keynote - Adventures Of Wallet Hacking by Joe Grand.mp4
|
67.4 MB
|
Keynote - Adventures Of Wallet Hacking by Joe Grand.srt
|
98.2 KB
|
Leveraging Electromagnetic Emanations For IoT Malware Classification by Damien Marion, Pham, Annelie.mp4
|
49.4 MB
|
Leveraging Electromagnetic Emanations For IoT Malware Classification by Damien Marion, Pham, Annelie.srt
|
49.2 KB
|
Optimization And Amplification Of Cache Side Channel Signals by David Kaplan.mp4
|
31.6 MB
|
Optimization And Amplification Of Cache Side Channel Signals by David Kaplan.srt
|
50.4 KB
|
Perimeter Breached Hacking An Access Control System by Steve Povolny & Sam Quinn.mp4
|
57.4 MB
|
Perimeter Breached Hacking An Access Control System by Steve Povolny & Sam Quinn.srt
|
90.0 KB
|
Physical Side Channel Attacks On PCs by Daniel Genkin & Roei Schuster.mp4
|
62.1 MB
|
Physical Side Channel Attacks On PCs by Daniel Genkin & Roei Schuster.srt
|
77.2 KB
|
Self-labeling Electronic Shelf Labels by Steffen Robertz.mp4
|
50.3 MB
|
Self-labeling Electronic Shelf Labels by Steffen Robertz.srt
|
80.9 KB
|
Unwanted Features Finding & Exploiting An In ROM Buffer Overflow On The LPC55S69 by Laura Abbott.mp4
|
53.8 MB
|
Unwanted Features Finding & Exploiting An In ROM Buffer Overflow On The LPC55S69 by Laura Abbott.srt
|
82.6 KB
|
bd-jb Blu-ray Disc Java Sandbox Escape by Andy Nguyen.mp4
|
32.9 MB
|
bd-jb Blu-ray Disc Java Sandbox Escape by Andy Nguyen.srt
|
54.4 KB
|
/
|
hardwear.io logo 2.jpg
|
4.7 KB
|
hardwear.io logo.png
|
373.6 KB
|
hardwear.io thank you.txt
|
0.8 KB
|
Total files 615
|