Hardwear.io Conference 2018 Logo

Hardwear.io Conference 2018

0
Free
Updated 11 March 2025
Visit Website

Welcome Note - Antriksh Shah Spreading The Load: Building A Better Hardware Hacking Community - Kate Temkin Strategies To Harden And Neutralize UAV Using RF DEW - José Lopes Esteves The Race To Secure Texas Instruments Graphing Calculators - Brandon Wilson It WISN't Me, Attacking Industrial Wireless Mesh Networks - Erwin Paternotte And Mattijs Van Ommeren There Goes Your PIN - Exploiting Smartphone Sensor Fusion Under Single And Cross User Setting - David Berend Smart Car Forensics And Sensor Warfare - Gabriel Cirlig And Stefan Tanase TLBleed: When Protecting Your CPU Caches Is Not Enough - Ben Gras And Kaveh Razavi CXO Panel - Who Needs IoT Security Certification? - People The Future Of Hardware Security Is In Open Standards - Helena Handschuh The Undercover World Of Reverse-Engineering Based Integrated Circuit Attacks - Olivier Thomas Z-Shave. Exploiting Z-Wave Downgrade Attacks - Andrew Tierney Bitfi - You Wouldn't Steal My Cloins - Andrew Tierney Fault Injection On Automotive Diagnosis Protocols - Santiago Cordoba Black Box Is Dead. Long Live Black Box! - Vladimir Kononovich And Aleksei Stennikov Product Security For IoT: Mission Impossible? - Alex Poschmann Closing Note And Prizes - Hardwear.io Crew

FEATURES

SIMILAR TOOLS

CLI program for cybersecurity solution management with multiple functionalities and authentication methods.

UPX is a high-performance executable packer for various executable formats.

A comprehensive guide for implementing best practices in cybersecurity across various systems.

SecTor has built a reputation of bringing together experts from around the world to share their latest research and techniques involving underground threats and corporate defences.

Porting GNU/Linux userland tools to the bionic/Linux userland of Android to provide access to the audit stream for Android applications with minimal overhead.

A Node.js Ebook by GENTILHOMME Thomas, covering Node.js development and resources

SWFTools is a collection of utilities for working with Adobe Flash files, including tools for converting PDFs, images, audio, and video files to SWF format.

echoCTF is a computer security framework for running cybersecurity exercises and competitions like Capture the Flag, used for network penetration testing and security auditing.

Guidance on securing NFS in Red Hat Enterprise Linux 7

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved