Search results

    NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based ToolkitWOOT '20Steffen Klee, Alexandros Roussos, Max Maass, Matthias Hollick
    Office Document Security and PrivacyWOOT '20Jens Müller, Fabian Ising, Christian Mainka, Vladislav Mladenov, Sebastian Schinzel, Jörg Schwenk
    One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit MicrocontrollersWOOT '20Johannes Obermaier, Marc Schink, Kosma Moczek
    Automatic Generation of Compact Printable Shellcodes for x86WOOT '20Dhrumil Patel, Aditya Basu, Anish Mathuria
    When Oblivious is Not: Attacks against OPAMWOOT '20Nirjhar Roy, Nikhil Bansal, Gourav Takhar, Nikhil Mittal, Pramod Subramanyan
    BLESA: Spoofing Attacks against Reconnections in Bluetooth Low EnergyWOOT '20Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Dave (Jing) Tian, Antonio Bianchi, Mathias Payer, Dongyan Xu
    Unearthing the TrustedCore: A Critical Review on Huawei’s Trusted Execution EnvironmentWOOT '20Marcel Busch, Johannes Westphal, Tilo Mueller
    Firmware Insider: Bluetooth Randomness is Mostly RandomWOOT '20Jörn Tillmanns, Jiska Classen, Felix Rohrbach, Matthias Hollick
    AFL++ : Combining Incremental Steps of Fuzzing ResearchWOOT '20Andrea Fioraldi, Dominik Maier, Heiko Eißfeldt, Marc Heuse
    Hardware Security Is Hard: How Hardware Boundaries Define Platform SecurityWOOT '20Alex Matrosov
    On Adaptive Attacks to Adversarial Example DefensesScAINet '20
    Getting Passive Aggressive about False PositivesScAINet '20
    Combating Social Media Information Operations with Neural Language ModelsScAINet '20
    Optimization for Attack Surface Exploration: The Case of TLSScAINet '20
    On Design and Enhancement of Smart Grid Honeypot System for Practical Collection of Threat IntelligenceCSET '20Daisuke Mashima, Derek Kok, Wei Lin, Muhammad Hazwan, Alvin Cheng
    Bridging Missing Gaps in Evaluating DDoS ResearchCSET '20Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, Jun Li
    Historical Analysis of Exploit Availability TimelinesCSET '20Allen D. Householder, Jeff Chrabaszcz, Trent Novelly, David Warren, Jonathan M. Spring
    Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK TechniquesCSET '20Seungoh Choi, Jongwon Choi, Jeong-Han Yun, Byung-Gil Min, HyoungChun Kim
    UBCIS: Ultimate Benchmark for Container Image ScanningCSET '20Shay Berkovich, Jeffrey Kam, Glenn Wurster
    HAI 1.0: HIL-based Augmented ICS Security DatasetCSET '20Hyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, HyoungChun Kim
    Towards Adversarial Phishing DetectionCSET '20Thomas Kobber Panum, Kaspar Hageman, René Rydhof Hansen, Jens Myrup Pedersen
    Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT)CSET '20Kayla Afanador, Cynthia Irvine
    Toward Orchestration of Complex Networking ExperimentsCSET '20Alefiya Hussain, Prateek Jaipuria, Geoff Lawler, Stephen Schwab, Terry Benzel
    APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted Attack SequencesCSET '20Yusuke Takahashi, Shigeyoshi Shima, Rui Tanabe, Katsunari Yoshioka
    ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security ResourceCSET '20Benjamin Green, Richard Derbyshire, William Knowles, James Boorman, Pierre Ciholas, Daniel Prince, David Hutchison