@tieknimmers Profile picture

Niek Timmers

@tieknimmers

Co-Founder of Raelize! (@raelizecom)

Similar User
Cristofaro Mune photo

@pulsoid

Raelize photo

@raelizecom

Philippe Teuwen photo

@doegox

hardwear.io photo

@hardwear_io

Tim Blazytko photo

@mr_phrazer

Keysight Device Security Testing photo

@Riscure

Aseem Jakhar photo

@aseemjakhar

NewAE Technology Inc photo

@newaetech

Antriksh (Yoda) #NullconGoa2025 photo

@antriksh_s

Jasper van Woudenberg photo

@jzvw

Dennis Elser photo

@h3artcontainer

🐘 @therealsaumil@infosec.exchange photo

@therealsaumil

Maxime Rossi Bellom photo

@max_r_b

Dmitry Nedospasov photo

@nedos

Maggie photo

@_m46s

Pinned

We are looking forward to give our #BootPwn experience at #HITB2023AMS in Amsterdam. There are still tickets available and April is often a very nice time to visit Amsterdam! But you know what they say: 'april doet wat hij wil'... (i.e., bring a rain coat).

Our first upcoming #BootPwn training will be on April 17-20 at #HITB2023AMS in Amsterdam, The Netherlands. More info: sectrain.hitb.org/courses/bootpw…



Niek Timmers Reposted

Join @tieknimmers for his advanced course, The Art of Fault Injection: Advanced Techniques and attacks. Come to BOOTSTRAP25 in Austin, TX, March 2025 and get complimentary access to our BOOTSTRAP25 event! ringzer0.training/bootstrap25-th…


Niek Timmers Reposted

At #hw_ioNL2024 we're in the process of creating the Van Goghs of the Hardware industry—The Art of Fault Injection (TAoFI) 🎨🖌️🔧 Along with brilliant minds @tieknimmers & @pulsoid Know More: hardwear.io/netherlands-20… #faultinjection #attacks #techniques

Tweet Image 1

Niek Timmers Reposted

Having some fun with an old CVE to explore ARM TrustZone more. Having no proper debuggability can really be a nightmare, especially when the MMU/caching is involved. Cool research by @raelizecom

Tweet Image 1

Niek Timmers Reposted

Looking forward to presenting my research tomorrow @hexacon_fr !

"HSM Security and Exploitation of USB over SPI bug" 💸 by Sergei Volokitin

Tweet Image 1


Niek Timmers Reposted

Our first keynote for #H2HC2024 (21 years): Cristofaro Mune @pulsoid @h2hconference

Tweet Image 1

Niek Timmers Reposted

If you are looking for the #ChipWhisperer Husky, there is currently stock on @crowd_supply The Husky will be back in stock on @MouserElec shortly. crowdsupply.com/newae/chipwhis…


Niek Timmers Reposted

Pi Pico2 EMFI update: Not enough time; no chance of the $10k bounty, but fun testing glitch detection (spoiler: it’s good). Pics: 1. Glitch detection disabled 2. Detection enabled Red=Successful loop corruption Green=No effect Blue=Reboot Yellow=Caught by detector (1mm coil@200V)

Tweet Image 1
Tweet Image 2

Niek Timmers Reposted

This paper was the perfect length for my flight home. Such an awesome attack. A little lost in the linear equation section but excited to try replicating it and seeing if it’s possible with voltage instead of EMFI or with much lower cost EMFI tooling

The air in Philadelphia is feeling very charged right now, as Jeroen Delvaux talks about using electromagnetic glitches that they used for “Breaking Espressif’s ESP32 V3: Program Counter Control with Computed Values using Fault Injection” #woot24

Tweet Image 1
Tweet Image 2


Niek Timmers Reposted

The air in Philadelphia is feeling very charged right now, as Jeroen Delvaux talks about using electromagnetic glitches that they used for “Breaking Espressif’s ESP32 V3: Program Counter Control with Computed Values using Fault Injection” #woot24

Tweet Image 1
Tweet Image 2

Niek Timmers Reposted

[#POC2024 Training] 👤 @pulsoid & @tieknimmers - The Art of Fault Injection: Advanced Techniques & Attacks 📅 Date: 4th ~ 6th Nov (3days) 🇰🇷 Venue: Four Seasons Hotel, Seoul, South Korea ‼️Registration ends on the "20th Sept"

Tweet Image 1

Niek Timmers Reposted

Shot Through the Heart: An Introduction to Fault Injection (@crowd_supply #Teardown2024) slides are up! grandideastudio.com/portfolio/secu…

What a weekend! Thanks to everyone who joined us at #Teardown2024. Keep the conversation going and catch up with the folks you met this weekend by joining our Discord community: discord.gg/RRsHCW9H6X



Niek Timmers Reposted

Are you a cool hacker? 🤔 Of course you are! ✨ It's time to stop hiding in plain sight and present your most recent findings at Hardwear.io Netherlands 2024. 🔺 The Call For Papers is open! Submit before 10th August 2024 👉 hardwear.io/netherlands-20… #cfp #hw_ioNL2024

Tweet Image 1

Niek Timmers Reposted

Exciting news! 🤩 18 papers were accepted and will be part of an amazing WOOT program on August 12-13 in Philadelphia! usenix.org/conference/woo… Stay tuned for more details on the program!


Niek Timmers Reposted

W00t! We're happy to share that our paper "Breaking Espressif's ESP32 V3: Program Counter Control with Computed Values using Fault Injection" will be presented at WOOT '24 (@wootsecurity). usenix.org/conference/woo…


Niek Timmers Reposted

Want to learn how to break Trusted Execution Environments (TEEs)? @pulsoid will teach TEEPwn: Breaking TEE by experience this July: ringzer0.training/doubledown24-t…


Niek Timmers Reposted

[#POC2024 NOTICE] ⏰Date: 7-8th November, 2024 🇰🇷Venue: Four Seasons Hotel, Seoul, South Korea 🎟️Registration: 2nd Sept ~ [CFP & CFT is opened] CFP - until 5th Oct CFT - until 31st July For more: powerofcommunity.net

Tweet Image 1

Niek Timmers Reposted

CVE-2024-4760: cve.org/cverecord?id=C… We used Chipwhisperer for voltage injection from @newaetech Also a current probe for power analysis from @Riscure Stay tuned for part 2&3


Niek Timmers Reposted

Everyone has their faults, but now you can learn how to inject faults into ESP32s with @pulsoid's The Art of Fault Injection course in Las Vegas, August 3 - 6: buff.ly/3QlZJYi


Niek Timmers Reposted

Changes on EVERY page, new chapter "Cryptocurrency cryptography" inc. PoW, algebraic hashing & Poseidon, multi-signatures, threshold signatures, zero-knowledge proofs, and more. NEW: section about Ed25519; the new Linux PRNG; NIST's PQC standards nostarch.com/serious-crypto…

Tweet Image 1

Niek Timmers Reposted

True benchmark for a FI tool is not a loop but PC/LR control through memcpy or any memory operation. Managed to corrupt the load instruction from register to PC and execute any code.

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.