Overview
Syllabus
Introduction
DEFCON
IOActive
Backdoors
Masks
Supply chain security
Threat taxonomy
Case studies
NDS
Nintendo vs Atari
Embedded Security
Smart Cities
Hardware Security
Hardware Labs
Root of Trust
Chip Anatomy
Attackers Toolbox
Blackbox Analysis
Glitch Attack
JTAG
Default passwords
Embedded world
Reactive Ion Etching
Chemical Bath
Polishing
Probe station
Intel chip architecture
We are not hacking
He loves chip hacking
AES Engine
Pro Mutation
Chip Tour
Flash Memory
Billion Gate Problem
Power Conduit
Designing for Security
Best Practices
KERS
Securing supply chain
Partner screening
Assurances
Trusted Foundry Program
Lack of Trust and Supply Chain
Robots
Taught by
nullcon