WOOT '20 | Automatic Generation of Compact Printable Shellcodes for x86 | Dhrumil Patel, Aditya Basu, Anish Mathuria |
WOOT '20 | When Oblivious is Not: Attacks against OPAM | Nirjhar Roy, Nikhil Bansal, Gourav Takhar, Nikhil Mittal, Pramod Subramanyan |
WOOT '20 | BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy | Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Dave (Jing) Tian, Antonio Bianchi, Mathias Payer, Dongyan Xu |
WOOT '20 | Unearthing the TrustedCore: A Critical Review on Huawei’s Trusted Execution Environment | Marcel Busch, Johannes Westphal, Tilo Mueller |
WOOT '20 | Firmware Insider: Bluetooth Randomness is Mostly Random | Jörn Tillmanns, Jiska Classen, Felix Rohrbach, Matthias Hollick |
WOOT '20 | AFL++ : Combining Incremental Steps of Fuzzing Research | Andrea Fioraldi, Dominik Maier, Heiko Eißfeldt, Marc Heuse |
WOOT '20 | Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers | Haehyun Cho, Jinbum Park, Joonwon Kang, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn |
WOOT '20 | ToothPicker: Apple Picking in the iOS Bluetooth Stack | Dennis Heinze, Jiska Classen, Matthias Hollick |
WOOT '20 | Bankrupt Covert Channel: Turning Network Predictability into Vulnerability | Dmitrii Ustiugov, Plamen Petrov, M. R. Siavash Katebzadeh, Boris Grot |
WOOT '20 | NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit | Steffen Klee, Alexandros Roussos, Max Maass, Matthias Hollick |
WOOT '20 | Office Document Security and Privacy | Jens Müller, Fabian Ising, Christian Mainka, Vladislav Mladenov, Sebastian Schinzel, Jörg Schwenk |
WOOT '20 | One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit Microcontrollers | Johannes Obermaier, Marc Schink, Kosma Moczek |
WOOT '19 | How Sharp is SHARP ? | Dixit Kumar, Chavhan Sujeet Yashavant, Biswabandan Panda, Vishal Gupta |
WOOT '19 | RISC-V: #AlphanumericShellcoding | Hadrien Barral, Rémi Géraud-Stewart, Georges-Axel Jaloyan, David Naccache |
WOOT '19 | Breaking Turtles All the Way Down: An Exploitation Chain to Break out of VMware ESXi | Hanqing Zhao, Yanyu Zhang, Kun Yang, Taesoo Kim |
WOOT '19 | Distributed Password Hash Computation on Commodity Heterogeneous Programmable Platforms | Branimir Pervan, Josip Knezovic, Katja Pericin |
WOOT '19 | Cross-Router Covert Channels | Adar Ovadia, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren |
WOOT '19 | Automatic Wireless Protocol Reverse Engineering | Johannes Pohl, Andreas Noack |
WOOT '19 | A better zip bomb | David Fifield |
WOOT '19 | D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation | Jithin Pavithran, Milan Patnaik, Chester Rebeiro |
WOOT '19 | Alternative (ab)uses for HTTP Alternative Services | Trishita Tiwari, Ari Trachtenberg |
WOOT '19 | MIN()imum Failure: EMFI Attacks against USB Stacks | Colin O'Flynn |
WOOT '19 | Taking a Look into Execute-Only Memory | Marc Schink, Johannes Obermaier |
WOOT '19 | Two methods for exploiting speculative control flow hijacks | Andrea Mambretti, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus |
WOOT '19 | Defeating Cisco Trust Anchor: A Case-Study of Recent Advancements in Direct FPGA Bitstream Manipulation | Jatin Kataria, Rick Housley, Joseph Pantoga, Ang Cui |