BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.securitybsides.org.uk//bsides-london-2024//talk//EHR
 QSN
BEGIN:VTIMEZONE
TZID:GMT
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:GMT
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T020000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:BST
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsides-london-2024-EHRQSN@cfp.securitybsides.org.uk
DTSTART;TZID=GMT:20241214T144500
DTEND;TZID=GMT:20241214T153000
DESCRIPTION:Embedded systems are everywhere\, automating more and more of o
 ur everyday lives. Our cars\, phones\, games consoles\, industrial control
 lers and IoT devices increasingly require security mechanisms to protect t
 heir security configurations\, and in some cases\, stored secrets\, such a
 s cryptographic keys\, debug/flash protection access mechanisms\, firmware
  images\, and AI models. For a long time\, local\, physical attacks on gen
 eral purpose microcontrollers were considered out of scope during threat a
 nalysis\, but the increase in value of breaking the device security protec
 tions\, the decrease in cost of the attacks\, and the increase in awarenes
 s of such attacks\, means that we’re in a transitional state regarding p
 rotection against fault-injection.
DTSTAMP:20260417T054634Z
LOCATION:Track 2
SUMMARY:Roll your own vulnerabilities\; an introduction to Fault-Injection 
 for exploiting bug-free code in embedded systems. - @barsteward
URL:https://cfp.securitybsides.org.uk/bsides-london-2024/talk/EHRQSN/
END:VEVENT
END:VCALENDAR
