Conferences

Search results

    TitleConferenceSpeaker(s)
    Mouse Trap: Exploiting Firmware Updates in USB PeripheralsWOOT '14Jacob Maskiewicz, Benjamin Ellis, James Mouradian, Hovav Shacham
    Zippier ZMap: Internet-Wide Scanning at 10 GbpsWOOT '14David Adrian, Zakir Durumeric, Gulshan Singh, J. Alex Halderman
    Through the Looking-Glass, and What Eve Found ThereWOOT '14Luca Bruno, Mariano Graziano, Davide Balzarotti, Aurélien Francillon
    Automated Reverse Engineering using Lego®WOOT '14Georg Chalupar, Stefan Peherstorfer, Erik Poll, Joeri de Ruiter
    Printed Circuit Board Deconstruction TechniquesWOOT '14Joe Grand
    Lowering the USB Fuzzing Barrier by Transparent Two-Way EmulationWOOT '14Rijnard van Tonder, Herman Engelbrecht
    IPv6 Security: Attacks and Countermeasures in a NutshellWOOT '14Johanna Ullrich, Katharina Krombholz, Heidelinde Hobel, Adrian Dabrowski, Edgar Weippl
    Clickjacking Revisited: A Perceptual View of UI SecurityWOOT '14Devdatta Akhawe, Warren He, Zhiwei Li, Reza Moazzezi, Dawn Song
    The End is Nigh: Generic Solving of Text-based CAPTCHAsWOOT '14Elie Bursztein, Jonathan Aigrain, Angelika Moscicki, John C. Mitchell
    Tick Tock: Building Browser Red Pills from Timing Side ChannelsWOOT '14Grant Ho, Dan Boneh, Lucas Ballard, Niels Provos
    Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS AttacksWOOT '14Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz
    Static Detection of Second-Order Vulnerabilities in Web ApplicationsUSENIX Security '14Johannes Dahse, Thorsten Holz
    Brahmastra: Driving Apps to Test the Security of Third-Party ComponentsUSENIX Security '14Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang, David Wetherall
    Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android AttacksUSENIX Security '14Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao
    Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware TokensUSENIX Security '14Daniel Demmler, Thomas Schneider, Michael Zohner
    ZØ: An Optimizing Distributing Zero-Knowledge CompilerUSENIX Security '14Matthew Fredrikson, Benjamin Livshits
    ASM: A Programmable Interface for Extending Android SecurityUSENIX Security '14Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi
    JIGSAW: Protecting Resource Access by Inferring Programmer ExpectationsUSENIX Security '14Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger
    Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVMUSENIX Security '14Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Úlfar Erlingsson, Luis Lozano, Geoff Pike
    SDDR: Light-Weight, Secure Mobile EncountersUSENIX Security '14Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee
    ret2dir: Rethinking Kernel IsolationUSENIX Security '14Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis
    BYTEWEIGHT: Learning to Recognize Functions in Binary CodeUSENIX Security '14Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley
    Succinct Non-Interactive Zero Knowledge for a von Neumann ArchitectureUSENIX Security '14Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
    Burst ORAM: Minimizing ORAM Response Times for Bursty Access PatternsUSENIX Security '14Jonathan Dautrich, Emil Stefanov, Elaine Shi
    FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel AttackUSENIX Security '14Yuval Yarom, Katrina Falkner

Pages