Hardware Security Training and Research

Hardware Security Resources, LLC offers courses, workshops, and curriculum to help introduce and ramp existing software security experts and hardware validation experts into the field of hardware security.

Do I Have a Hardware Implant?

I’ve gotten lots of inquiries from people who want to know if I could analyze some hardware for them or could recommend someone who might. I’ll be blunt - mo...

Hardware Implants

There’s recent news about some really interesting hardware implants. I wanted to take a bit to share more technical thoughts and details that can’t be reduce...

Submitting To A Cfp

I recently posted a twitter thread with some advice for submitting to CFPs and writing abstracts. I’m FINALLY containing it in a blog post with a few correct...

New For 2018

In between the busyness of last fall, I had some insight into what 2018 would look like and how I and SecuringHardware.com could rise up to meet it. I’ve spe...

2017 Wrapup

This year marks the end of SecuringHardware.com’s 5th successful year in business. Looking back, however, the definition of ‘success’ has improved significan...

Embedded Systems at 44CON in London

44Con 2016 was the first time I taught Applied Physical Attacks on Embedded Systems. In 2017, instead of a small room and a handful of people, we sold out to...

Taking January Off

After wrapping up a successful 2016, I had a unique opportunity to take January ‘off’. This doesn’t mean it was a vacation, but that I finally had the opport...

Q3 review and Upcoming Training

Five years ago while I still worked on pre- and post-silicon penetration testing of CPUs, I began teaching internal courses on hardware security to functiona...

Hacker Summer Camp, 2016

Who's ready for Wrong Island Con/Black Hat/BsidesLV/Tiaracon/Defcon? I'm pretty sure I'm not, but that's not going to stop it from starting tomorrow! Here's ...

Hacking in Vegas, 2014...

Here's a rundown of what's happening in Las Vegas over the next week: Wednesday, Aug 6th: Techniques for Ensuring Secure Silicon applied to Open-Source Veril...

Hierarchy of Hardware Attacks

Generally, there is a very low barrier to entry when it comes to software or network-based attacks due to the fact that actual costs are minimal and most res...

Retail Hacking For Fun And Savings

Most technically inclined thrifty shoppers shop online. Thriftier ones know how to use the interweb to find the best online deals. But sometimes, you really ...

Hacking the Nikon WU-1a

Nikon makes some pretty sweet cameras but seem to be stuck in the dark ages with some of their accessories. The WT-# series of accessories cost over $1000 wi...