theme image

hardware

hardware
profile
A Hacker’s guide to reducing side-channel attack surfaces using deep-learning
cryptography

A Hacker’s guide to reducing side-channel attack surfaces using deep-learning

Defcon & BH 2020

A Hacker Guide To Deep Learning Based Side Channel Attacks
cryptography

A Hacker Guide To Deep Learning Based Side Channel Attacks

Defcon 2019

Attacking encrypted USB keys the hard(ware) way
hacking

Attacking encrypted USB keys the hard(ware) way

Black Hat USA 2017

Bad beat: practical attacks against poker cheating devices
hacking

Bad beat: practical attacks against poker cheating devices

Mar 2017

Royal flush: an in-depth look at poker cheating devices accessories
hacking

Royal flush: an in-depth look at poker cheating devices accessories

Nov 2016

Full(er) House: Exposing high-end poker cheating devices
hacking

Full(er) House: Exposing high-end poker cheating devices

Oct 2016

Cheating at poker - James Bond Style
hacking

Cheating at poker - James Bond Style

Defcon 2016

Does dropping usb drives really work?
hacking

Does dropping usb drives really work?

Black Hat 2016

What are malicious usb keys and how to create a realistic one?
hacking

What are malicious usb keys and how to create a realistic one?

Aug 2016

Concerns about usb security are real: 48% of people do plug-in usb drives found in parking lots
hacking

Concerns about usb security are real: 48% of people do plug-in usb drives found in parking lots

Apr 2016

What tools do the fbi use when seizing computers or the curious case of the mouse jiggler device
hacking

What tools do the fbi use when seizing computers or the curious case of the mouse jiggler device

Jan 2016

Embedded management interfaces emerging massive insecurity
hacking

Embedded management interfaces emerging massive insecurity

Black Hat 2009

newsletter signup slide

Get cutting edge research directly in your inbox.

newsletter signup slide

Get cutting edge research directly in your inbox.