🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Hardware Security

Security of hardware devices, embedded systems, and physical security

50
Total Entries
40
Contributors
58
Unique Tags
56
Related Tags

Top Contributors

Nikhil Mittal(7) Jatin Kataria(5) Arun Mane(4) Aditya Gupta(3) Saumil Shah(3)

Related Tags (11)

Show all 11 tags...

All Entries (50 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07TalkBlackhat Uncovering ‘NASty’ 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing Kanika Guptareverse-engineeringfirmware-analysismobile-security+2
2025-04-04Tool demoBlackhat CompartIoT Source Code Sreesankar S, Aditya Krishna Vinod, Season Cherianmicrocontrollers
2025-04-03Tool demoBlackhat CompartIoT Source Code Sreesankar S, Aditya Krishna Vinod, Season Cherianmicrocontrollers
2025-03-02TalkNullcon Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks Presentation Shyam Kumar Arshid, Chinmay Krishnaembedded-securityfirmware-analysishardware-security+3
2024-11-21TalkDeepsec Hacking with Physics v2.0 Hrishikesh Somchatwarindustrial-control-systems-securityembedded-securityfirmware-analysis+3
2024-04-19TalkBlackhat Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems Presentation Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyayembedded-securityfirmware-analysisvulnerability-management+2
2023-08-10TalkDefcon Hardware Backdooring an e-Scooter Arun Manereverse-engineeringindustrial-control-systems-securityvulnerability-management+2
2023-08-10TalkDefcon Wheels of Wonder: Unveiling Car Hacking Poetry Presentation Video Hrishikesh Somchatwarfirmware-analysisreverse-engineeringautomotive-cybersecurity+1
2023-08-06TalkC0c0n A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things Video Panchami V, Mahima Mary Mathewsauthenticationprivacyembedded-security+1
2022-09-24TalkC0c0n Introduction to RFID/NFC Hacking Davis Sojanembedded-securityfirmware-analysishardware-security+3
2022-05-18TalkCan Sec West Launching EMUX - A framework for emulating ARM and MIPS IoT Devices Presentation Source Code Saumil Shahfirmware-analysisreverse-engineeringembedded-security+1
2021-11-12TalkC0c0n IoT Security Guidelines & Standards Yashodhan Vivek Mandkeembedded-securityiot-device-managementiot-security-testing+3
2020-10-02TalkBlackhat Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale Presentation Whitepaper Video Aravind Machiryembedded-systems
2020-03-18TalkCan Sec West The ARM-X Firmware Emulation Framework Presentation Source Code Saumil Shahredteamarmfirmware+5
2019-12-04TalkBlackhat Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing Presentation Whitepaper Video Karthik Ramasamyblueteamsmartcard
2019-11-09TalkToor Con 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringhardware-reverse-engineeringvulnerability-management+3
2019-09-27TalkC0c0n Defense in Depth for Embedded Systems Presentation Jiggyasu Sharmaembedded-systemsblueteam
2019-08-09TalkDefcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringvulnerability-managementsecurity-architecture+2
2019-08-08TalkBlackhat 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringhardware/embedded
2019-05-21TalkPhdays How to fail in hardware hacking Presentation Arun Mageshredteamhardware
2019-05-21TalkPhdays Rapid hardware hacking 101 Arun Mageshhardwareredteamiot
2018-10-05TalkC0c0n Cybersecurity Embedded Digital Transformation - The Future Sunil Kanchiembedded-securitysecurity-architectureindustrial-control-systems-security
2018-08-11Tool demoDefcon HealthyPi—Connected Health Source Code Ashwin Whitchurchhealthcarehardwareopensource+1
2018-08-09TalkDefcon Backdooring DVR/NVR devices Arun Manehardware-reverse-engineeringembedded-securitypentesting+3
2017-11-14TalkBlackhat Pwning a Smart Home in Under 10 Minutes Presentation Aditya Guptaiot-pentestingembedded-securitypentesting+3
2017-10-05TalkVirus Bulletin The router of all evil: more than just default passwords and silly scripts Presentation Whitepaper Video Himanshu Anandvulnerability-managementreverse-engineeringpentesting+1
2017-08-04TalkSha Attacking OpenSSL using Side-channel Attacks: The RSA case study Whitepaper Praveen Vadnalareverse-engineeringvulnerability-managementsecurity-architecture+1
2017-07-27TalkDefcon ICS Humla Presentation Video Sneha Rajguru, Arun Maneics-securityindustrial-control-systems-securitypentesting+2
2017-03-03TalkNullcon Case Study on RFID (proximity cards) hacking Presentation Sarwar Jahan, Ashwath Kumarrfidredteaminfrastructure
2016-11-05TalkHackfest LockPicker: Leaking data from live LUKS partition Adhokshaj Mishralinuxredteamhardware
2016-11-04Tool demoBlackhat Firmware Analysis Toolkit (FAT) Source Code Aditya Guptafirmwareanalysisiot+1
2016-08-05TalkDefcon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Jatin Katariareverse-engineeringhardware-reverse-engineeringfirmware-analysis+3
2016-06-18TalkRecon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Presentation Video Jatin Katariareverse-engineeringhardware-reverse-engineeringfirmware-analysis+3
2016-03-11TalkNullcon Physical Lock Security Amey Gat, Swapnil Wadwalkarpentestingreverse-engineeringvulnerability-management+1
2016-03-11TalkNullcon Hitchhiker’s guide to hacking Industrial Control systems (ICS) Arun Maneredteamicshid
2015-11-12Tool demoBlackhat Kautilya: Fastest shells you will ever get Source Code Nikhil Mittalhidredteamshell+1
2015-11-05TalkGround Zero Summit Sanctioned to Hack: Your SCADA HMIs Belong to Us! Aditya K Soodics-securityweb-securityvulnerability-management+3
2015-11-05TalkGround Zero Summit Hacking RFIDs under 2000INR Jayesh Chauhanrfidnetworkredteam
2015-08-06Tool demoBlackhat Kautilya Source Code Nikhil Mittalhidredteamshell+1
2015-08-01TalkC0c0n Hacking RFIDs under 2000 INR Jayesh Chauhan, Divya S Johnrfidnetwork
2014-02-14TalkNullcon Hardware Attack Vectors Presentation Video Yashin Mehaboobehardwareredteamhid+3
2013-11-07TalkGround Zero Summit Serial killing of embedded systems Atul Alexembedded-systems
2012-12-01TalkClubhack Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC Presentation Video Aditya Gupta, Subho Haldermobilenfcnetwork+1
2012-03-16TalkBlackhat The Pwnage Saga Continues Presentation Video Nikhil Mittalhidredteamshell
2011-12-15TalkBlackhat Kautilya: Teensy Beyond Shell Presentation Whitepaper Source Code Nikhil Mittalhidredteamshell
2011-12-04TalkClubhack Mere paas Teensy hai Presentation Nikhil Mittalhidredteamshell+1
2011-11-25TalkMalcon Mareech : Look it’s a HID made up of gold Nikhil Mittalhidredteammalware
2011-11-04TalkHackfest Here are your keystrokes Nikhil Mittalredteamkeyloggingpentest+2
2011-02-25TalkNullcon Penetration Testing a Biometric System Presentation Whitepaper Video Rahul Sasipentestbiometrichid+1
2009-04-22TalkHitb Sec Conf Pwnage 2.0 Presentation Saumil Shahhidredteamshell