WOOT '15 | Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring | Gary Wang, Zachary J. Estrada, Cuong Pham, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
WOOT '15 | CAIN: Silently Breaking ASLR in the Cloud | Antonio Barresi, Kaveh Razavi, Mathias Payer, Thomas R. Gross |
WOOT '15 | Run-DMA | Michael Rushanan, Stephen Checkoway |
WOOT '15 | Fast and Vulnerable: A Story of Telematic Failures | Ian Foster, Andrew Prudhomme, Karl Koscher, Stefan Savage |
WOOT '15 | Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition | Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields |
WOOT '15 | Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis | Sean Palka, Damon McCoy |
WOOT '15 | Replication Prohibited: Attacking Restricted Keyways with 3D-Printing | Ben Burgess, Eric Wustrow, J. Alex Halderman |
WOOT '14 | Inaudible Sound as a Covert Channel in Mobile Devices | Luke Deshotels |
WOOT '14 | Security Impact of High Resolution Smartphone Cameras | Tobias Fiebig, Jan Krissler, Ronny Hänsch |
WOOT '14 | Attacking the Linux PRNG On Android: Weaknesses in Seeding of Entropic Pools and Low Boot-Time Entropy | David Kaplan, Sagi Kedmi, Roee Hay, Avi Dayan |
WOOT '14 | An Experience Report on Extracting and Viewing Memory Events via Wireshark | Sarah Laing, Michael E. Locasto, John Aycock |
WOOT '14 | Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware | Katja Malvoni, Solar Designer, Josip Knezovic |
WOOT '14 | Mouse Trap: Exploiting Firmware Updates in USB Peripherals | Jacob Maskiewicz, Benjamin Ellis, James Mouradian, Hovav Shacham |
WOOT '14 | Zippier ZMap: Internet-Wide Scanning at 10 Gbps | David Adrian, Zakir Durumeric, Gulshan Singh, J. Alex Halderman |
WOOT '14 | Through the Looking-Glass, and What Eve Found There | Luca Bruno, Mariano Graziano, Davide Balzarotti, Aurélien Francillon |
WOOT '14 | Automated Reverse Engineering using Lego® | Georg Chalupar, Stefan Peherstorfer, Erik Poll, Joeri de Ruiter |
WOOT '14 | Printed Circuit Board Deconstruction Techniques | Joe Grand |
WOOT '14 | Lowering the USB Fuzzing Barrier by Transparent Two-Way Emulation | Rijnard van Tonder, Herman Engelbrecht |
WOOT '14 | IPv6 Security: Attacks and Countermeasures in a Nutshell | Johanna Ullrich, Katharina Krombholz, Heidelinde Hobel, Adrian Dabrowski, Edgar Weippl |
WOOT '14 | Clickjacking Revisited: A Perceptual View of UI Security | Devdatta Akhawe, Warren He, Zhiwei Li, Reza Moazzezi, Dawn Song |
WOOT '14 | The End is Nigh: Generic Solving of Text-based CAPTCHAs | Elie Bursztein, Jonathan Aigrain, Angelika Moscicki, John C. Mitchell |
WOOT '14 | Tick Tock: Building Browser Red Pills from Timing Side Channels | Grant Ho, Dan Boneh, Lucas Ballard, Niels Provos |
WOOT '14 | Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks | Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz |
WOOT '14 | Green Lights Forever: Analyzing the Security of Traffic Infrastructure | Branden Ghena, William Beyer, Allen Hillaker, Jonathan Pevarnek, J. Alex Halderman |
WOOT '13 | Truncating TLS Connections to Violate Beliefs in Web Applications | Ben Smyth, Alfredo Pironti |