Papers

Search results

    ConferenceTitleAuthor(s)
    WOOT '17unCaptcha: A Low-Resource Defeat of reCaptcha's Audio ChallengeKevin Bock, Daven Patel, George Hughey, Dave Levin
    WOOT '17Breaking (and Fixing) a Widely Used Continuous Glucose Monitoring SystemLuca Reverberi, David Oswald
    WOOT '17Exploitations of Uninitialized Uses on macOS SierraZhenquan Xu, Gongshen Liu, Tielei Wang, Hao Xu
    WOOT '17dr0wned – Cyber-Physical Attack with Additive ManufacturingSofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, Jacob Gatlin, Yuval Elovici
    WOOT '17Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing
    WOOT '17One Car, Two Frames: Attacks on Hitag-2 Remote Keyless Entry Systems RevisitedRyad Benadjila, Mathieu Renard, José Lopes-Esteves, Chaouki Kasmi
    WOOT '17POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault InjectionJames Patrick-Evans, Lorenzo Cavallaro, Johannes Kinder
    WOOT '17Breaking and Fixing GridcoinMartin Grothe, Tobias Niemann, Juraj Somorovsky, Jörg Schwenk
    WOOT '17Shattered Trust: When Replacement Smartphone Components AttackOmer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren
    WOOT '17White-Stingray: Evaluating IMSI Catchers Detection ApplicationsShinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Andrew Martin, Jean-Pierre Seifert
    WOOT '17Software Grand Exposure: SGX Cache Attacks Are PracticalFerdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi
    WOOT '17Stalling Live Migrations on the CloudAhmed Atya, Azeem Aqil, Karim Khalil, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas F. La Porta
    WOOT '17SPEAKE(a)R: Turn Speakers to Microphones for Fun and ProfitMordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici
    WOOT '17 From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacksAnil Kurmus, Nikolas Ioannou, Matthias Neugschwandtner, Nikolaos Papandreou, Thomas Parnell
    WOOT '17One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing SessionsTom Van Goethem, Wouter Joosen
    WOOT '17Adversarial Example Defense: Ensembles of Weak Defenses are not StrongWarren He, James Wei, Xinyun Chen, Nicholas Carlini, Dawn Song
    WOOT '17BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault InjectionAng Cui, Rick Housley
    WOOT '16Acceleration Attacks on PBKDF2: Or, What Is inside the Black-Box of oclHashcat?Andrew Ruddick, Jeff Yan
    WOOT '16Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLSHanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic
    WOOT '16Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation CorrectnessDavid Rupprecht, Kai Jansen, Christina Pöpper
    WOOT '16Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung PayDaeseon Choi, Younho Lee
    WOOT '16How to Phone Home with Someone Else’s Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic SensorsBenyamin Farshteindiker, Nir Hasidim, Asaf Grosz, Yossi Oren
    WOOT '16Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network TrafficBrendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon, Qi Zhang, Xiangyu Zhang, Dongyan Xu, John Qian
    WOOT '16Hardware-Assisted Rootkits: Abusing Performance Counters on the ARM and x86 ArchitecturesMatt Spisak
    WOOT '16AVLeak: Fingerprinting Antivirus Emulators through Black-Box TestingJeremy Blackthorne, Alexei Bulazel, Andrew Fasano, Patrick Biernat, Bülent Yener

Pages