WOOT '19 | Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing | Dominik Maier, Benedikt Radtke, Bastian Harren |
WOOT '19 | Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO | Sangsup Lee, Daejun Kim, Dongkwan Kim, Sooel Son, Yongdae Kim |
WOOT '19 | Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem | Fabian Ullrich, Jiska Classen, Johannes Eger, Matthias Hollick |
WOOT '18 | Universal Radio Hacker: A Suite for Analyzing and Attacking Stateful Wireless Protocols | Johannes Pohl, Andreas Noack |
WOOT '18 | Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet Scale | Alexander Vetterl, Richard Clayton |
WOOT '18 | Swipe Your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud | Julian Fietkau, Starbug , Jean-Pierre Seifert |
WOOT '18 | Tools for Active and Passive Network Side-Channel Detection for Web Applications | Michael Lescisin, Qusay Mahmoud |
WOOT '18 | Security Analysis of eIDAS – The Cross-Country Authentication Scheme in Europe | Nils Engelbertz, Nurullah Erinola, David Herring, Juraj Somorovsky, Vladislav Mladenov, Jörg Schwenk |
WOOT '18 | Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers | Jonas Bushart |
WOOT '18 | Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming | Rom Ogen, Kfir Zvi, Omer Shwartz, Yossi Oren |
WOOT '18 | NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages | Stephan Kleber, Henning Kopp, Frank Kargl |
WOOT '18 | Hitag 2 Hell – Brutally Optimizing Guess-and-Determine Attacks | Aram Verstegen, Roel Verdult, Wouter Bokslag |
WOOT '18 | Physical Adversarial Examples for Object Detectors | Dawn Song, Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramer, Atul Prakash, Tadayoshi Kohno |
WOOT '18 | SoK: Make JIT-Spray Great Again | Robert Gawlik, Thorsten Holz |
WOOT '18 | Fishy Faces: Crafting Adversarial Images to Poison Face Authentication | Giuseppe Garofalo, Vera Rimmer, Tim Van hamme, Davy Preuveneers, Wouter Joosen |
WOOT '18 | Spectre Returns! Speculation Attacks using the Return Stack Buffer | Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael Abu-Ghazaleh |
WOOT '18 | You Snooze, You Lose: Measuring PLC Cycle Times under Attacks | Matthias Niedermaier, Jan-Ole Malchow, Florian Fischer, Daniel Marzin, Dominik Merli, Volker Roth, Alexander von Bodisco |
WOOT '18 | Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives | Mathy Vanhoef, Frank Piessens |
WOOT '18 | A Feasibility Study of Radio-frequency Retroreflector Attack | Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi, Michael Smith |
WOOT '18 | Browser history re:visited | Michael Smith, Craig Disselkoen, Shravan Narayan, Fraser Brown, Deian Stefan |
WOOT '17 | Automated PCB Reverse Engineering | Stephan Kleber, Henrik Ferdinand Nölscher, Frank Kargl |
WOOT '17 | fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor Customizations | Roee Hay |
WOOT '17 | AutoCTF: Creating Diverse Pwnables via Automated Bug Injection | Patrick Hulin, Andy Davis, Rahul Sridhar, Andrew Fasano, Cody Gallagher, Aaron Sedlacek, Tim Leek, Brendan Dolan-Gavitt |
WOOT '17 | Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery | Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi |
WOOT '17 | Shedding too much Light on a Microcontroller's Firmware Protection | Johannes Obermaier, Stefan Tatschner |