A look at the current authentication mechanisms, and their shortcomings.
A method, with example code, for automatically protecting physical interfaces on embedded systems.
Identity and Authentication in the Digital Age
Defcon 27 CTF Finals Recap
Demonstrates a class of vulnerabilities that stem from TrustZone usage on modern mobile phones.
An automated NFC fuzzing framework for Android devices.
A Python module for interacting with smart cards.
Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical and virtual machines.