Papers

Search results

    ConferenceTitleAuthor(s)
    WOOT '15Hypervisor Introspection: A Technique for Evading Passive Virtual Machine MonitoringGary Wang, Zachary J. Estrada, Cuong Pham, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    WOOT '15CAIN: Silently Breaking ASLR in the CloudAntonio Barresi, Kaveh Razavi, Mathias Payer, Thomas R. Gross
    WOOT '15Run-DMAMichael Rushanan, Stephen Checkoway
    WOOT '15Fast and Vulnerable: A Story of Telematic FailuresIan Foster, Andrew Prudhomme, Karl Koscher, Stefan Savage
    WOOT '15Cocaine Noodles: Exploiting the Gap between Human and Machine Speech RecognitionTavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields
    WOOT '15Fuzzing E-mail Filters with Generative Grammars and N-Gram AnalysisSean Palka, Damon McCoy
    WOOT '15Replication Prohibited: Attacking Restricted Keyways with 3D-PrintingBen Burgess, Eric Wustrow, J. Alex Halderman
    WOOT '14Inaudible Sound as a Covert Channel in Mobile DevicesLuke Deshotels
    WOOT '14Security Impact of High Resolution Smartphone CamerasTobias Fiebig, Jan Krissler, Ronny Hänsch
    WOOT '14Attacking the Linux PRNG On Android: Weaknesses in Seeding of Entropic Pools and Low Boot-Time EntropyDavid Kaplan, Sagi Kedmi, Roee Hay, Avi Dayan
    WOOT '14An Experience Report on Extracting and Viewing Memory Events via WiresharkSarah Laing, Michael E. Locasto, John Aycock
    WOOT '14Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel HardwareKatja Malvoni, Solar Designer, Josip Knezovic
    WOOT '14Mouse Trap: Exploiting Firmware Updates in USB PeripheralsJacob Maskiewicz, Benjamin Ellis, James Mouradian, Hovav Shacham
    WOOT '14Zippier ZMap: Internet-Wide Scanning at 10 GbpsDavid Adrian, Zakir Durumeric, Gulshan Singh, J. Alex Halderman
    WOOT '14Through the Looking-Glass, and What Eve Found ThereLuca Bruno, Mariano Graziano, Davide Balzarotti, Aurélien Francillon
    WOOT '14Automated Reverse Engineering using Lego®Georg Chalupar, Stefan Peherstorfer, Erik Poll, Joeri de Ruiter
    WOOT '14Printed Circuit Board Deconstruction TechniquesJoe Grand
    WOOT '14Lowering the USB Fuzzing Barrier by Transparent Two-Way EmulationRijnard van Tonder, Herman Engelbrecht
    WOOT '14IPv6 Security: Attacks and Countermeasures in a NutshellJohanna Ullrich, Katharina Krombholz, Heidelinde Hobel, Adrian Dabrowski, Edgar Weippl
    WOOT '14Clickjacking Revisited: A Perceptual View of UI SecurityDevdatta Akhawe, Warren He, Zhiwei Li, Reza Moazzezi, Dawn Song
    WOOT '14The End is Nigh: Generic Solving of Text-based CAPTCHAsElie Bursztein, Jonathan Aigrain, Angelika Moscicki, John C. Mitchell
    WOOT '14Tick Tock: Building Browser Red Pills from Timing Side ChannelsGrant Ho, Dan Boneh, Lucas Ballard, Niels Provos
    WOOT '14Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS AttacksMarc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz
    WOOT '14Green Lights Forever: Analyzing the Security of Traffic InfrastructureBranden Ghena, William Beyer, Allen Hillaker, Jonathan Pevarnek, J. Alex Halderman
    WOOT '13Truncating TLS Connections to Violate Beliefs in Web ApplicationsBen Smyth, Alfredo Pironti

Pages