Title |
Conference |
Tags |
A little review of security challenges in Silicon Photonics integrated circuits. |
t2-2017 - helsinki,finland |
|
Tools for Practical Attacks on Analog-to-Digital Converter |
s4x17-2017 - miami,usa |
|
HOW TO FOOL AN ADC PART II OR HIDING DESTRUCTION OF TURBINE WITH A LITTLE HELP OF SIGNAL PROCESSING |
BlackHatEU-2016 - London,uk |
|
How to fool an ADC II or attacks against data processing in sigma-delta |
t2-2016 - helsinki,finland |
|
How to fool an ADC, part II or attacks against sigma-delta data converters |
HardwearIO-2016 - the hague, netherlands |
|
A Rising Tide: Design Exploits in Industrial Control Systems |
WOOT-2016 - austin,usa |
|
When the medicine is more dangerous than the disease: mobile antivirus security assessment |
Confidence-2016 - karkow,poland |
|
NEVER TRUST YOUR INPUTS: CAUSING 'CATASTROPHIC PHYSICAL CONSEQUENCES' FROM THE SENSOR (OR HOW TO FOOL ADC) |
BlackHatAsia-2016 - marina bay,singapore |
|
Practical Firmware Reversing and Exploit Development for AVR-based Embedded Devices |
DeepSec-2015 - vienna,austria |
|
Practical exploit development for AVR-based devices. |
t2-2015 - helsinki,finland |
|
SCADA AND MOBILE: SECURITY ASSESSMENT OF THE APPLICATIONS THAT TURNS YOUR SMARTPHONE INTO A FACTORY CONTROL ROOM |
BlackHatMobileSecurity-2015 - London,UK |
|
SCADA and mobile: security assessment of the applications that turns your smartphone into a factory control room. |
Confidence-2015 - Krakow,Poland |
|
How to Fuzz 100+ Industrial DTM Components and Stay Alive |
s4-2015 - florida,usa |
|
DTM components: shadow keys to the ICS kingdom |
ZeroNights-2014 - moscow,russia |
|
ICSCorsair: How I will PWN your ERP through 4-20 mA current loop. |
t2InfoSecCon-2014 - helsinki,finland |
|
DTM COMPONENTS: SHADOW KEYS TO THE ICS KINGDOM |
BlackHatEU-2014 - amsterdam,netherlands |
|
ICSCORSAIR: HOW I WILL PWN YOUR ERP THROUGH 4-20 MA CURRENT LOOP |
BlackHatUS-2014 - las vegas,usa |
|
HART As An Attack Vector: Current Loop to Application Layer |
S4-2014 - Miami,USA |
|
With BIGDATA comes BIG responsibility: Practical exploiting of MDX injections |
BlackHatUSA-2013 - Las Vegas,USA |
|