Hardwear.io Conference 2018 Logo

Hardwear.io Conference 2018

0
Free
Visit Website

Welcome Note - Antriksh Shah Spreading The Load: Building A Better Hardware Hacking Community - Kate Temkin Strategies To Harden And Neutralize UAV Using RF DEW - José Lopes Esteves The Race To Secure Texas Instruments Graphing Calculators - Brandon Wilson It WISN't Me, Attacking Industrial Wireless Mesh Networks - Erwin Paternotte And Mattijs Van Ommeren There Goes Your PIN - Exploiting Smartphone Sensor Fusion Under Single And Cross User Setting - David Berend Smart Car Forensics And Sensor Warfare - Gabriel Cirlig And Stefan Tanase TLBleed: When Protecting Your CPU Caches Is Not Enough - Ben Gras And Kaveh Razavi CXO Panel - Who Needs IoT Security Certification? - People The Future Of Hardware Security Is In Open Standards - Helena Handschuh The Undercover World Of Reverse-Engineering Based Integrated Circuit Attacks - Olivier Thomas Z-Shave. Exploiting Z-Wave Downgrade Attacks - Andrew Tierney Bitfi - You Wouldn't Steal My Cloins - Andrew Tierney Fault Injection On Automotive Diagnosis Protocols - Santiago Cordoba Black Box Is Dead. Long Live Black Box! - Vladimir Kononovich And Aleksei Stennikov Product Security For IoT: Mission Impossible? - Alex Poschmann Closing Note And Prizes - Hardwear.io Crew

FEATURES

ALTERNATIVES

A command-line tool for parsing, creating, and manipulating JWT tokens

Framework for creating jeopardy CTF challenges with configurable structure and efficient integration.

Package verification tool for npm with various verification and testing capabilities.

Github action for linting AWS IAM policy documents.

A tool for auditing and reporting Unix host security with the ability to perform a lockdown.

shellfirm will prompt challenges to verify risky shell commands, acting as a captcha for your terminal.

International cybersecurity festival for all, who wants to dive into the world of cyber security and have a great time.

A daily updated list of the top 1 million websites in the world, ordered by referring subnets.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved