The speaker’s profile picture
Andrew 'bunnie' Huang
  • Improving Trust in Supply Chains: Translating Research Into Everyday-Use Techniques
The speaker’s profile picture
Andrew Zonenberg
  • Extracting Antifuse Secrets from the RP2350 by FIB PVC
The speaker’s profile picture
Bernhard Lippmann

(later or old one)

  • RESEC: Contributing to Trusted Chip Design using Reverse Engineering Methods
The speaker’s profile picture
Carlos Lopez

Carlos Lopez is a systems reverse-engineer with TechInsights Canada. Mr. Lopez has nearly 30 years of experience in the hardware and software reverse engineering field. This includes almost anything with a microprocessor such as toys, games, computer software, casino, financial, transportation, industrial, medical, communications, security hardware and more.

Mr. Lopez does not have any university education and used his experience and self-teaching to gain an understanding of hardware and software systems. This includes learning many computer languages, digital electronics and semiconductor process and design.

  • Hardware Anti-Tampering and Data Integrity Protection
The speaker’s profile picture
Deruo Cheng
  • Deep Learning for Invasive Data Recovery from Flash Memories
The speaker’s profile picture
Dominik Klein

Dominik Klein obtained a masters degree (Diplom) from RWTH Aachen university and a PhD in computer science from Japan Advanced Institute of Science and Technology. After that, he joined the German Federal office for Information security (BSI) where he served in various positions, related to hardware security, i.e. ensuring the security of the German eID documents. Since 2022 he is head of the unit "Chip Security" at BSI.

  • Hardware Trojan Attacks with PCBs: Theory and experimental evaluation
The speaker’s profile picture
Federico Zamberlan
  • Die-Polygon-Capturing: From Hobbyist Hack to Automated Reverse Engineering Tool
The speaker’s profile picture
Jean-Max Dutertre

Jean-Max Dutertre, Professor at Mines Saint-Etienne
Head of the Secure Architectures and Systems department
Research interest: hardware security, fault injection attacks, side-channel analysis, reverse engineering

  • Data Extraction from Memory using Photon Emission Microscopy
The speaker’s profile picture
Johann Knechtel
  • Hardware Trojan Threats to Cache Coherence in Modern 2.5D Chiplet Systems
  • Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort
The speaker’s profile picture
Jos Craaijo
  • libLISA: Instruction Discovery and Analysis on x86-64
The speaker’s profile picture
Liu Qing

Dr. Liu Qing received his bachelor's degree from the School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore (NTU). He then completed his PhD study in School of Materials Science and Engineering, NTU. He joined Globalfoundries Singapore (formerly Chartered Semiconductor) in 2008 as a Senior Engineer. Since 2010, he worked in Temasek Laboratories at NTU (TL@NTU). He is currently a Principal Research Scientist in TL@NTU. His main research interest is Hardware Assurance, specifically sample preparation, imaging and security analysis.

  • Hardware Assurance and Security for IoT Microcontrollers
The speaker’s profile picture
Lucas Georget

3rd year PhD student in France working with EDF R&D (Paris-Saclay) and LAAS-CNRS (Toulouse), my main research focuses are in industrial supply chain, hardware and radio vulnerabilities, and detection methods development. For that I study hardware trojan detection in FPGAs used for safety.

  • What's inside your industrial black-box component? Let's analyze some micro-architectural signals!
The speaker’s profile picture
Michael DiBattista

Michael DiBattista is the Vice President at Varioscale, Inc. He is currently focused on large scale deprocessing of advanced node semiconductor devices and laser chemical based deposition and etch solutions for 3D heterogenous integrated (3DHI) microsystems . He has worked in the semiconductor industry for 24 years, holding positions at Intel Corporation, FEI Company (ThermoFisher), and Qualcomm Incorporated that focused on developing tools and technology to support semiconductor physical failure analysis and focused ion beam (FIB) based circuit modification. Michael has more than 30 publications in the semiconductor, electron/ion microscopy, and chemical sensor fields and has 12 issued patents. Michael received his Ph.D., M.S.E. and B.S.E. in Chemical Engineering from the University of Michigan, USA.

  • An Integrated Circuit Backside Approach for Large Area Deprocessing with Chemically Assisted Focused Ion Beam Sputtering and Optical Metrology Feedback
The speaker’s profile picture
Mirjana Stojilovic

​Mirjana Stojilović is a researcher and lecturer at the School of Computer and Communication Sciences at EPFL. Her work primarily focuses on reconfigurable systems, including developing new device architectures and advanced EDA algorithms and investigating hardware security vulnerabilities.

  • Decoding FPGA Routing Architectures with NetCracker
The speaker’s profile picture
Nevena Rankovic

Assistant Professor in Artificial Intelligence with a strong background in Computer Sciences, she is passionate about using AI to enhance software estimation processes, particularly in robust design and optimization methods aimed at improving business performance from satisfaction to success. Her multifaceted research interests include software engineering, applied AI, business intelligence, agile development, and the cutting-edge areas of graph neural networks and deep learning. She has a deep understanding of web technologies, software quality, requirements engineering, and software project management. Additionally, her expertise extends to software testing, software metrics, and robust experiment design using orthogonal arrays.

She is also actively involved in advancing Explainable AI and its applications in computer-aided diagnostics in medicine, demonstrating a unique blend of computing in mathematics, natural sciences, engineering, and medicine. Having enriched her academic insights with substantial industry experience, she has also published over 45 papers in various prestigious international journals, marked her presence as a notable speaker at several conferences, and authored three books, including a monograph published by Springer Nature. Her contributions to artificial intelligence and software engineering significantly advance both academic knowledge and practical applications, meeting the complex demands of today's fast-paced business and health sectors.

  • Die-Polygon-Capturing: From Hobbyist Hack to Automated Reverse Engineering Tool
The speaker’s profile picture
Quint van der Linden
  • Die-Polygon-Capturing: From Hobbyist Hack to Automated Reverse Engineering Tool
The speaker’s profile picture
René Walendy

I'm an interdisciplinary researcher at the intersection of hardware security, human-computer interaction, and psychology.

Coming from an engineering background, I have seen time and time again the profound impact of looking beyond your own discipline in building systems that successfully transfer great cyber security research into practice - systems that are secure, usable, and support the people that rely on them in precisely the right places.

I believe in the potential of bringing people from diverse backgrounds together to do open, transparent, and reproducible research - and communicating your research well to other disciplines.

In my Ph.D. project, I collaborate extensively with researchers from cognitive science and psychology to understand how people perform reverse engineering in practice. With this foundational research, my team wants to open new avenues for protecting microelectronics from malicious attacks and for educating the next generation of hardware security talents.

  • Training Hardware Hackers: Insights from the Trenches
The speaker’s profile picture
Samuel Chef
  • Laser Frequency Mapping and Laser Voltage Tracing for analysis of embedded memory circuit
The speaker’s profile picture
Simon Klix

Ph.D. student at MPI-SP in Bochum. Studying hardware security and netlist reverse engineering.

  • Revisiting Graph Neural Networks for Netlist Reverse Engineering
The speaker’s profile picture
Tay Jing Yun
  • Study of Front-Side Approach to Retrieve Stored Data in Emerging Non-Volatile Memory Devices Using CP-AFM
The speaker’s profile picture
Tuba Kiyan
  • Unveiling Sensitive Data through Optical Scan Chain Probing