Biblio

Export 5 results:
Filters: Author is Joeri de Ruiter  [Clear All Filters]
2018
Chothia T, de Ruiter J, Smyth B.  2018.  Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. 27th USENIX Security Symposium (USENIX Security 18). :1563--1580.
2016
Chothia T, de Ruiter J.  2016.  Learning From Others’ Mistakes: Penetration Testing IoT Devices in the Classroom. 2016 USENIX Workshop on Advances in Security Education (ASE 16).
2015
de Ruiter J, Poll E.  2015.  Protocol State Fuzzing of TLS Implementations. 24th USENIX Security Symposium (USENIX Security 15). :193--206.
2014
Chalupar G, Peherstorfer S, Poll E, de Ruiter J.  2014.  Automated Reverse Engineering using Lego®. 8th USENIX Workshop on Offensive Technologies (WOOT 14).