Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Home
  • Attend
    • Registration Information
    • Registration Discounts
    • Venue, Hotel, and Travel
    • Students and Grants
    • Co-Located Workshops
  • Program
  • Participate
    • Instructions for Participants
    • Call for Papers
  • Sponsorship
  • About
    • Workshop Organizers
    • Services
    • Questions
    • Help Promote!
    • Past Workshops
  • Home
  • Attend
  • Program
  • Participate
    • Instructions for Participants
    • Call for Papers
  • Sponsorship
  • About
    • Workshop Organizers
    • Services
    • Questions
    • Help Promote!
    • Past Workshops

sponsors

Bronze Sponsor

help promote

WOOT '16 button

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Media Coverage
Tweet

connect with us

Media Coverage

Ian Foster on "Fast and Vulnerable: A Story of Telematic Failures"

View the paper and associated media

  • Apparently All Cars Can Be Hacked Now: Insurance Dongle Edition (The Truth About Cars, 8.11.15)
  • Car dongles let you hack the brakes (Wired UK, 8.11.15)
  • Corvette hijacked by hacking its insurance dongle (Geek, 8.11.15)
  • Chevy Corvette is latest car breached by hackers (autoblog, 8.11.15)
  • Hackers Cut a Corvette’s Brakes Via a Common Car Gadget (Wired, 8.11.15)
  • Hackers Remotely Engage Corvette’s Brakes Through Insurance Dongle (übergizmo, 8.11.15)
  • Insurance monitoring dashboard devices used by Uber let hackers "cut your brakes" over wireless (boingboing, 8.11.15)
  • Researchers Hack Corvette’s Brake System (Clapway, 8.11.15)
  • Researchers Hacked The Brakes Of A Corvette With Text Messages (Fast Company, 8.11.15)
  • Researchers wirelessly hack a Corvette's brakes using an insurance dongle (The Verge, 8.11.15)
  • Small Wireless Car Devices Allow Hackers to Take Control of a Vehicle's Brakes (Gizmodo, 8.11.15)
  • Cars can now be hacked with a text message (Metro Weekly, 8.12.15)
  • Corvette hack is one more reason to be wary of connected cars (CIO, 8.12.15)
  • Hackers Cut Corvette's Brakes After Infiltrating Its Dashboard (Newsmax, 8.12.15)
  • Hackers disable Corvette brakes by texting dongle meant to lower insurance risk (International Business Times, 8.12.15)
  • Hackers show how easily a PHONE can be used to take control of a Corvette (Daily Mail, 8.12.15)
  • How texting a Corvette could stop it in its tracks (Computerworld, 8.12.15)
  • Potentially fatal auto risk traced to UBI devices (Insurance Business, 8.12.15)
  • Small Wireless Car Devices Allow Hackers To Take Control Of A Vehicle's Brakes (Gizmodo, 8.12.15)
  • TXT message leaves Corvette wrecked (The Register UK, 8.12.15)
  • UCSD Researchers Hacked A Corvette and Disabled Its Brakes With A Text Message (iDigitalTimes, 8.12.15)
  • Updates are coming for a telematics unit that hacked a Corvette (PCWorld, 8.12.15)
  • Cars can be hacked by their tiny, plug-in insurance discount trackers (CNN Money, 8.13.15)
  • Hackers control car using a mobile phone in eye-opening footage claiming to expose security flaws (Mirror.co.uk, 8.13.15)
  • Hackers use insurance gadget to remotely control Corvette (Fox News, 8.13.15)
  • How to hack a Corvette with a text message (ZDNet, 8.13.15)
  • Security researchers hack a Corvette using text message (IT Pro, 8.13.15)
  • Government email security woes widen with Pentagon breach and more (TechTarget, 8.14.15)
  • Luxury Car Hacking Risk Widespread; Evidence Suppressed: Researchers (Insurance Journal, 8.14.15)

Or Peles on "One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android"

View the paper and associated media

  • Another day, another stunning security flaw in Android – this time hitting 55% of mobes (The Register UK, 8.10.15)
  • Android Flaw Lets Rogue Apps Hijack Phones (Tom's Guide, 8.11.15)
  • IBM finds app lookalike flaw in Android (Computer Business Review, 8.11.15)
  • Patched Android ‘Serialization’ Vulnerability Affects 55 Percent of Devices (Threatpost, 8.11.15)

Florian Adamsky on "P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks"

View the paper and associated media

  • How BitTorrent could let lone DDoS attackers bring down big sites (ArsTechnica, 8.16.15)
  • Torrent network could let single hacker bring down major websites (Digital Journal, 8.16.15)
  • BitTorrent applications left vulnerable to DDoS attacks (ITProPortal, 8.17.15)
  • BitTorrent can be exploited for large-scale DoS attacks (ITNews, 8.17.15)
  • BitTorrent exploits allow lone hackers to launch large DDoS attacks (ZDNet, 8.17.15)
  • BitTorrent family susceptible to DRDoS attacks (We Live Security, 8.17.15)
  • BitTorrent programs can be abused to amplify distributed denial-of-service attacks (ComputerWorld, 8.17.15)
  • BitTorrent programs can be abused to amplify distributed denial-of-service attacks (ComputerWorld India, 8.17.15)
  • BitTorrent programs can be abused to amplify distributed denial-of-service attacks (CSO Australia, 8.17.15)
  • BitTorrent programs can be abused to amplify distributed denial-of-service attacks (IT World, 8.17.15)
  • BitTorrent programs can be abused to amplify distributed denial-of-service attacks (Network World, 8.17.15)
  • BitTorrent programs can be abused to amplify distributed denial-of-service attacks (PC Advisor, 8.17.15)
  • BitTorrent programs can be abused to supercharge denial-of-service attacks (PCWorld, 8.17.15)
  • Using BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks (Threatpost, 8.17.15)
  • Your torrent client could help hackers hijack your computer (ExtremeTech, 8.17.15)
  • BitTorrent programs can be abused to amplify distributed denial-of-service attacks (PCWorld New Zealand, 8.18.15)
  • BitTorrent programs can be abused to amplify distributed denial-of-service attacks (TechWorld Australia, 8.18.15)
  • BitTorrent: Theoretical boosted DoS attack threat has been mitigated (The Inquirer, 8.18.15)
  • New BitTorrent DRDoS Attacks Amp Up Risk, Researchers Warn (Security Intelligence, 8.18.15)

Clemens Hlauschek on "Prying Open Pandora's Box: KCI Attacks against TLS"

View the paper and associated media

  • Dying cipher suites are stinking up TLS with man-in-the-middle vulns (The Register UK, 8.11.15)

Ian Foster on "Fast and Vulnerable: A Story of Telematic Failures"

View the paper and associated media

  • Corvette’s brakes hacked using an insurance dongle common in US cars (Silicon Republic, 8.12.15)
  • Hackers Cut Corvette's Brakes After Infiltrating Its Dashboard (Newsmax, 8.12.15)
  • New research shows that hackers can control connected cars using text messages (Uncover Michigan, 8.12.15)
  • Security researchers hack a car and apply the brakes via text (The Guardian, 8.12.15)
  • Security researchers hack a Corvette using text message (IT Pro, 8.13.15)
  • The Summer Of Car Hacks Continues (Dark Reading, 8.13.15)
  • Hackers Hijack Corvette's Brakes Through Insurance Black Box (TechTimes, 8.14.15)
  • Hackers infiltrate telematics technology (Insurance Business, 8.14.15)

Bronze Sponsors

© USENIX

  • Privacy Policy
  • Contact Us