Meeting Register Page

Hardwear.io Virtual Con: Hacking, Community, and Hope
Hardwear.io Virtual Con: Hacking, Community and Hope
Talks:

1. LVI: Hijacking Transient Execution with Load Value Injection by Daniel Gruss, Daniel Moghimi, and Jo Van Bulck

2. Breaking Deployed Crypto, The Side-channel Analyst's Way by Daniel Moghimi

3. Firmly Rooted in Hardware: Practical protection from firmware attacks in the hardware supply chain by Sophia d’Antoine, and Jeff Spielberg

4. From the Bluetooth Standard to Standard Compliant 0-days by Daniele Antonioli, and Mathias Payer

5. Capturing Mask ROMs by John McMaster

6. Defeating TLS client authentication using fault attacks by Nicolas Oberli and Sylvain Pelissier

7. Reverse Engineering of Neural Network Architectures via Side Channel by Stjepan Picek

8. Hints from Hardware Security for solving real-world challenges by Dr. Sergei Skorobogatov

9. Starbleed or The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs by Maik Ender

-------------------------------------------------------------------------
Capture the Signal (CTS)

A new challenge-based CTF that focuses exclusively on the reverse engineering of radio signals. This activity is also known as "blind signal analysis" as the signals' specifications are unknown to the attacker. This contest is organized by renowned community radio-hackers for researchers, hackers, and practitioners in the field!

More information: https://hardwear.io/virtual-con-2020/ctf.php
Sign up for CTS: https://board.cts.maggi.cc/register
-------------------------------------------------------------------------

**The information shared with us through this form will be used to communicate about future hardwear.io activities. Your personal information will never be shared with anyone outside of the hardwear.io organization.**
Hardwear.io Logo
Meeting is over, you can not register now. If you have any questions, please contact Meeting host: Hardwear.io Virtual Con.