BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.troopers.de//tr26-cfp//speaker//STVW73
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-tr26-cfp-QADSVY@cfp.troopers.de
DTSTART;TZID=CET:20260625T131500
DTEND;TZID=CET:20260625T141500
DESCRIPTION:This talk shows our 4-year long journey of investigating SIM-or
 iginating attacks. We discovered multiple vulnerabilities across a myriad 
 of devices ranging from phones to car chargers. The highlighted attacks in
 clude privacy leaks\, corrupted memories in basebands\, lockscreen bypasse
 s and other logic bugs allowing us to control modems in unexpected ways.\n
 \nBeyond these attacks\, we discuss the tooling we built along the way and
  provide an outlook into the future research of this attack surface.
DTSTAMP:20260510T025743Z
LOCATION:Track 1
SUMMARY:A SIM Hacking Odyssey: Can a SIM hack YOU? - Tomasz Lisowski\, Mari
 us Muench
URL:https://cfp.troopers.de/tr26-cfp/talk/QADSVY/
END:VEVENT
END:VCALENDAR
