From Trammell Hudson's Projects
My talk was discussing the details of my research with Xeno Kovah and Corey Kallenberg that resulted in Thunderstrike 2.
I offered to loan my Thunderbolt adapters to anyone who needed one. No one wanted to take me up on it after the Thunderstrike talk.
Intel's Advanced Threat Research group cited our work on Thunderstrike 2 as a potential vector for firmware rootkits. They showed how such a rootkit could easily circumvent virtualization and hypervisor security.
The Rootpipe discussion was really depressing -- the vulnerability might go back to OSX 10.0. @osxreverser and Emil Kvarrhamar had shoutouts.
There was live transcription, which were often full of swear words and attempts to interact with the transcribers. Sometimes it worked.
Overall everyone was attempting to improve security. I'm not sure if this works.
A few more photos, although I wasn't taking very many on this trip.