Papers

Search results

    ConferenceTitleAuthor(s)
    WOOT '19Unicorefuzz: On the Viability of Emulation for Kernelspace FuzzingDominik Maier, Benedikt Radtke, Bastian Harren
    WOOT '19Who Spent My EOS? On the (In)Security of Resource Management of EOS.IOSangsup Lee, Daejun Kim, Dongkwan Kim, Sooel Son, Yongdae Kim
    WOOT '19Vacuums in the Cloud: Analyzing Security in a Hardened IoT EcosystemFabian Ullrich, Jiska Classen, Johannes Eger, Matthias Hollick
    WOOT '18Universal Radio Hacker: A Suite for Analyzing and Attacking Stateful Wireless ProtocolsJohannes Pohl, Andreas Noack
    WOOT '18Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet ScaleAlexander Vetterl, Richard Clayton
    WOOT '18Swipe Your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity FraudJulian Fietkau, Starbug , Jean-Pierre Seifert
    WOOT '18Tools for Active and Passive Network Side-Channel Detection for Web ApplicationsMichael Lescisin, Qusay Mahmoud
    WOOT '18Security Analysis of eIDAS – The Cross-Country Authentication Scheme in EuropeNils Engelbertz, Nurullah Erinola, David Herring, Juraj Somorovsky, Vladislav Mladenov, Jörg Schwenk
    WOOT '18Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS ResolversJonas Bushart
    WOOT '18Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-JammingRom Ogen, Kfir Zvi, Omer Shwartz, Yossi Oren
    WOOT '18NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual MessagesStephan Kleber, Henning Kopp, Frank Kargl
    WOOT '18Hitag 2 Hell – Brutally Optimizing Guess-and-Determine AttacksAram Verstegen, Roel Verdult, Wouter Bokslag
    WOOT '18Physical Adversarial Examples for Object DetectorsDawn Song, Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramer, Atul Prakash, Tadayoshi Kohno
    WOOT '18SoK: Make JIT-Spray Great AgainRobert Gawlik, Thorsten Holz
    WOOT '18Fishy Faces: Crafting Adversarial Images to Poison Face AuthenticationGiuseppe Garofalo, Vera Rimmer, Tim Van hamme, Davy Preuveneers, Wouter Joosen
    WOOT '18Spectre Returns! Speculation Attacks using the Return Stack BufferEsmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael Abu-Ghazaleh
    WOOT '18You Snooze, You Lose: Measuring PLC Cycle Times under AttacksMatthias Niedermaier, Jan-Ole Malchow, Florian Fischer, Daniel Marzin, Dominik Merli, Volker Roth, Alexander von Bodisco
    WOOT '18Symbolic Execution of Security Protocol Implementations: Handling Cryptographic PrimitivesMathy Vanhoef, Frank Piessens
    WOOT '18A Feasibility Study of Radio-frequency Retroreflector AttackSatohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi, Michael Smith
    WOOT '18Browser history re:visitedMichael Smith, Craig Disselkoen, Shravan Narayan, Fraser Brown, Deian Stefan
    WOOT '17Automated PCB Reverse EngineeringStephan Kleber, Henrik Ferdinand Nölscher, Frank Kargl
    WOOT '17fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor CustomizationsRoee Hay
    WOOT '17AutoCTF: Creating Diverse Pwnables via Automated Bug InjectionPatrick Hulin, Andy Davis, Rahul Sridhar, Andrew Fasano, Cody Gallagher, Aaron Sedlacek, Tim Leek, Brendan Dolan-Gavitt
    WOOT '17Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability DiscoveryTommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi
    WOOT '17Shedding too much Light on a Microcontroller's Firmware ProtectionJohannes Obermaier, Stefan Tatschner

Pages