Home Riscure Workshop 2023

Riscure Workshop 2023

The 16th Riscure Workshop is coming soon! Join us this summer and fall in one of the locations around the world. Register using the form below to express your interest.

Riscure Workshop 2023: Date and Location

We are pleased to invite you to Riscure’s 16th Global Workshop, our annual event where we share the latest developments in the field of device security. You are welcome to join us at the workshop in one of the locations across the world. Please, specify your preferred location when filling in the form below.

What is the Riscure User Workshop?

Our goal is to meet with current and future customers of our Inspector and True Code products range. We will share the latest developments in Pre- and Post-Silicon security, demo our new tools and talk about the most recent research advancements. You will also have a chance to get in contact with colleagues from various industries, specializing in embedded hardware and software.

Dates and Locations

Riscure Workshop is an in-person event. Feel free to register your interest by completing the form below. Detailed agenda of the event will be posted later. Once you register, we will let you know when it is available.

  • Tuesday August 15th – The Computer History Museum, Mountain View, California
  • Thursday August 17th – Hilton Washington Dulles Airport, Herdon, Virginia
  • Friday September 15th – Prague (following CHES from 10-14 September)
  • Tuesday October 10th – Shaza Hotel, Riyadh, Saudi Arabia
  • Tuesday October 31st – Lotte World Hotel, Seoul, South Korea
  • Thursday November 2nd – Tokyo, Japan

Exclusive events for your team only

During our Riscure Workshop tour we also offer a chance to have a private event with your team. Private events require a minimum of 10 attendees from your company. We will be happy to offer a customized program with the knowledge and Riscure tool demonstrations that suit your needs. If you are interested, please get in touch with us via welove.fi@riscure.com.

Agenda – During the event we expect to cover the following topics:

  • What’s Hot – What’s Happened: Gain valuable insights into the intriguing stories and notable events that have shaped the security landscape this year.
  • Fuzzing Embedded Code (Including Demo): Gain valuable insights into the process of systematically injecting invalid or unexpected inputs into software to uncover vulnerabilities, with a live demonstration showcasing the effectiveness of this technique in identifying potential security weaknesses in embedded code.
  • Non-invasive Voltage Fault Injection Demo (Smart Phone attack explained) – In this demo, we will perform a VFI attack on target device without removing any component and cutting any core powerlines.
  • Pre-Silicon for Fault Injection: Learn about our recent developments in Pre-Silicon for Fault Injection and discover how you can fortify the security of your chip during the design phase.
  • Product Demos:
    • Clock Glitcher: An ‘old’ test method for Smart Cards re-invented. A solution to conduct Clock Glitching attacks will be discussed.
    • New Inspector Version: Linux and Python version with new current probe.
  • DJI Mavic Pro Drone Glitching – IOActive Drone Attack Explained: We’ll delve into the emerging threat of electromagnetic fault injection attacks against drones, emphasizing the vulnerabilities and potential consequences of such attacks.
  • Opportunity to Browse Live Demos: Get hands on experience with our tools and learn how they work from Riscure’s security experts.
  • Product Roadmap & Research at Riscure: Stay informed about our latest releases and roadmap for Inspector and True Code. We will also share details on the latest research projects underway at Riscure.
Register now by filling in the form below!

WeLove.fi: join us in social media

WeLove.FI is an initiative of Riscure to educate and advocate the industry on the threat and the potential impact of Fault Injection attacks. Our purpose is to show on one side how customers can protect themselves against fault injection attacks, and on the other side demonstrate the potential of Fault Injection research as we constantly investigate new attack methods.

Join us in Twitter and LinkedIn and follow the latest developments of the WeLove.fi initiative with the hashtag #welovefi.

  • Contact us
  • Bartek Gedrojc

  • Vice President Sales Products