Papers

Search results

    ConferenceTitleAuthor(s)
    WOOT '16malWASH: Washing Malware to Evade Dynamic AnalysisKyriakos K. Ispoglou, Mathias Payer
    WOOT '16Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way)Frank Imeson, Saeed Nejati, Siddharth Garg, Mahesh Tripunitara
    WOOT '16Fillory of PHY: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital RadioSergey Bratus, Travis Goodspeed, Ange Albertini, Debanjum S. Solanky
    WOOT '16SoK: XML Parser VulnerabilitiesChristopher Späth, Christian Mainka, Vladislav Mladenov, Jörg Schwenk
    WOOT '16Abusing Public Third-Party Services for EDoS AttacksHuangxin Wang, Zhonghua Xi, Fei Li, Songqing Chen
    WOOT '16DDoSCoin: Cryptocurrency with a Malicious Proof-of-WorkEric Wustrow, Benjamin VanderSloot
    WOOT '16A Rising Tide: Design Exploits in Industrial Control SystemsAlexander Bolshev, Jason Larsen, Marina Krotofil, Reid Wightman
    WOOT '16This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion PumpYoungseok Park, Yunmok Son, Hocheol Shin, Dohyun Kim, Yongdae Kim
    WOOT '16Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital SystemsHocheol Shin, Yunmok Son, Youngseok Park, Yujin Kwon, Yongdae Kim
    WOOT '16Truck Hacking: An Experimental Analysis of the SAE J1939 StandardYelizaveta Burakova, Bill Hass, Leif Millar, André Weimerskirch
    WOOT '16Controlling UAVs with Sensor Input Spoofing AttacksDrew Davidson, Hao Wu, Rob Jellinek, Vikas Singh, Thomas Ristenpart
    WOOT '16A Security Analysis of an In-Vehicle Infotainment and App PlatformSahar Mazloom, Mohammad Rezaeirad, Aaron Hunter, Damon McCoy
    WOOT '16How to Break Microsoft Rights Management ServicesMartin Grothe, Christian Mainka, Paul Rösler, Jörg Schwenk
    WOOT '15FLEXTLS: A Tool for Testing TLS ImplementationsBenjamin Beurdouche, Antoine Delignat-Lavaud, Nadim Kobeissi, Alfredo Pironti, Karthikeyan Bhargavan
    WOOT '15Prying Open Pandora's Box: KCI Attacks against TLSClemens Hlauschek, Markus Gruber, Florian Fankhauser, Christian Schanes
    WOOT '15P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS AttacksFlorian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan
    WOOT '15Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and EconomicsGiancarlo Pellegrino, Christian Rossow, Fabrice J. Ryba, Thomas C. Schmidt, Matthias Wählisch
    WOOT '15Own Your Android! Yet Another Universal RootWen Xu, Yubin Fu
    WOOT '15One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in AndroidOr Peles, Roee Hay
    WOOT '15RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human MobilityTakuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori
    WOOT '15SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded SystemsKarl Koscher, Tadayoshi Kohno, David Molnar
    WOOT '15Symbolic Execution for BIOS SecurityOleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer
    WOOT '15IoTPOT: Analysing the Rise of IoT CompromisesYin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow
    WOOT '15Scrutinizing WPA2 Password Generating Algorithms in Wireless RoutersEduardo Novella Lorente, Carlo Meijer, Roel Verdult
    WOOT '15How to Break XML Encryption – AutomaticallyDennis Kupser, Christian Mainka, Jorg Schwenk, Juraj Somorovsky

Pages