Our Publications
2023
2022
- Glitching devices for code execution @ No Hat 2022
- Breaking SoC Security by Glitching OTP Data Transfers @ Hardwear.io USA 2022
- The Hidden Threat: Breaking into Connected Devices for Infrastructure Compromise @ HackinBo 2022
- Exploiting QSEE, the Raelize Way! @ HITBSecConf2021 Amsterdam
- An Unexpected Cup of QSEE @ Zer0con 2021
- Trust Ain't Easy: Challenges of TEE Security @ Linaro Connect 2021
- Voiding Trust: Real-world TEE Attacks @ ASRG Monthly Meeting
- Breaking TEEs by Experience @ iSeCon2021
- Look mum, no key! Bypassing Encrypted Secure Boot @ hardwear.io webinars
- Look mum, no key! Bypassing Encrypted Secure Boot @ Riscure User Workshop 2020
- Pwdless Exploitation Tales from RouterLand @ NULLCON 2020
- Debunking Fault Injection Myths and Misconceptions @ HITB Cyberweek (UAE)
- Hardening Secure Boot on Embedded Devices @ BlueHat IL 2019
- Attacking AUTOSAR using Software and Hardware Attacks @ Escar USA 2019
- Designing Secure Boot Securely @ NULLCON 2019
- OverTime: Remote Timing Attacks against IoT devices @ Hardwear.io USA 2019
- Using Fault Injection to Turn Data Transfers into Arbitrary Execution @ POC 2019
- Attack Simulation to Enhance Fault Injection and Defenses @ Black Hat EU 2018
- Extracting and Analyzing Automotive Firmware Efficiently @ Escar Europe 2018
- Extracting and Analyzing Automotive Firmware Efficiently @ Black Hat USA 2018
- Fault Injection on Diagnosis Protocols @ Escar USA 2018
- Advancing FI attacks: Fault Models opportunities @ PANDA 2018
- AES-CBC Shellcode @ PoC||GTFO 0x17
- R00ting the Unexploitable using Hardware Fault Injection @ BlueHat v17
- Secure Initialization of TEEs: when Secure Boot falls short... @ EuskalHack 2017
- Escalating Privileges in Linux using Fault injection @ FDTC 2017
- KERNELFAULT: Pwning Linux using Hardware Fault Injection @ hardwear.io 2017
- Random NOPs on ARM @ PoC||GTFO 0x14
- Bypassing Secure Boot using Fault Injection @ Black Hat EU 2016
- Controlling PC on ARM using Fault Injection @ FDTC 2016
- Unboxing the White-Box @ Black Hat EU 2016
- (Too much) Access Points - Exploitation Roundup @ CONFidence 2010
- Hijacking mobile data connections @ Black Hat EU 2009
Contact Us
Contact Details
Feel free to contact us, we will be happy to listen and support.
Meeuwenlaan 20, 3055 CL, Rotterdam, The Netherlands
Email: info@raelize.com
VAT: NL861445934B01
KVK: 78549477