A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components |
ACM CCS 2017
|
Trojan-tolerant Hardware & Supply Chain Security in Practice |
DEF CON 25
|
DC to DEF CON: Q&A; with Congressmen James Langevin and Will Hurd |
DEF CON 25
|
OpenCrypto: Unchaining the JavaCard Ecosystem |
Black Hat USA 2017
|
Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking |
Black Hat Europe 2016
|