Skip to main content
USENIX
Conferences
Students
Sign in
Overview
Workshop Organizers
At a Glance
Workshop Program
Co-Located Workshops
Activities
Birds-of-a-Feather Sessions
Sponsorship
Students and Grants
Questions?
Help Promote!
For Participants
Call for Papers
Past Workshops
sponsors
Bronze Sponsor
twitter
Tweets by @usenix
usenix conference policies
Event Code of Conduct
Conference Network Policy
Statement on Environmental Responsibility Policy
You are here
Home
»
Embedded and Hardware Security
Tweet
connect with us
http://twitter.com/usenixsecurity
http://www.usenix.org/facebook
http://www.usenix.org/linkedin
http://www.usenix.org/gplus
http://www.usenix.org/youtube
Embedded and Hardware Security
Presentations:
Automated Reverse Engineering using Lego®
Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware
Printed Circuit Board Deconstruction Techniques
Mouse Trap: Exploiting Firmware Updates in USB Peripherals
Lowering the USB Fuzzing Barrier by Transparent Two-Way Emulation
connect with us